Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 14851 - 14880 of 16633

Full-Text Articles in Physical Sciences and Mathematics

Art Gardens To Create Sacred Earth Connections, Education For Sustainability Summer Institute, Jim Embry Jul 2011

Art Gardens To Create Sacred Earth Connections, Education For Sustainability Summer Institute, Jim Embry

Education for Sustainability Summer Institute

No abstract provided.


Gps Workshop, Education For Sustainability Summer Institute, S. Kay Gandy Jul 2011

Gps Workshop, Education For Sustainability Summer Institute, S. Kay Gandy

Education for Sustainability Summer Institute

No abstract provided.


2011 Schedule Of Events, Education For Sustainability Summer Institute Jul 2011

2011 Schedule Of Events, Education For Sustainability Summer Institute

Education for Sustainability Summer Institute

The WKU College of Education and Behavioral Sciences and Center for Environmental Education and Sustainability hosted the first Education for Sustainability Summer Institute (EFSSI 2011) for Kentucky and the region on July 21-22, 2011. Participants learned about model programs, practical strategies, and resources for integrating sustainability into classes, schools, and districts. This event is the first of its kind in Kentucky and the region. It is being hosted by the WKU College of Education and Behavioral Sciences and WKU Center for Environmental Education and Sustainability.

Click on Download button for full Schedule of Events.


Education For Sustainability Summer Institute 2011 Conference Program Jul 2011

Education For Sustainability Summer Institute 2011 Conference Program

Education for Sustainability Summer Institute

EFSSI 2011 is designed for pre-K-12 teachers, university faculty and staff, non-formal educators, and administrators. Come to learn about successful program models and practical strategies for integrating sustainability into classes, schools, and districts.

Click on the Download button for full Conference Program.


Full Conference Program With Abstracts, Jason S. Polk, Leslie A. North Jun 2011

Full Conference Program With Abstracts, Jason S. Polk, Leslie A. North

International 2011 Conference on Karst Hydrogeology and Ecosystems

No abstract provided.


Ios Mobile Device Forensics: Initial Analysis, Rita M. Barrios, Michael R. Lehrfeld May 2011

Ios Mobile Device Forensics: Initial Analysis, Rita M. Barrios, Michael R. Lehrfeld

Annual ADFSL Conference on Digital Forensics, Security and Law

The ability to recover forensic artifacts from mobile devices is proving to be an ever-increasing challenge for investigators. Coupling this with the ubiquity of mobile devices and the increasing complexity and processing power they contain results in a reliance on them by suspects. In investigating Apple’s iOS devices -- namely the iPhone and iPad -- an investigator’s challenges are increased due to the closed nature of the platforms. What is left is an extremely powerful and complex mobile tool that is inexpensive, small, and can be used in suspect activities. Little is known about the internal data structures of the …


Forensic Analysis Of Smartphones: The Android Data Extractor Lite (Adel), Felix Freiling, Michael Spreitzenbarth, Sven Schmitt May 2011

Forensic Analysis Of Smartphones: The Android Data Extractor Lite (Adel), Felix Freiling, Michael Spreitzenbarth, Sven Schmitt

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to the ubiquitous use of smartphones, these devices become an increasingly important source of digital evidence in forensic investigations. Thus, the recovery of digital traces from smartphones often plays an essential role for the examination and clarification of the facts in a case. Although some tools already exist regarding the examination of smartphone data, there is still a strong demand to develop further methods and tools for forensic extraction and analysis of data that is stored on smartphones. In this paper we describe specifications of smartphones running Android. We further introduce a newly developed tool – called ADEL – …


Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi May 2011

Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we present the current results and analysis of the survey “Cloud forensics and critical criteria for cloud forensic capability” carried out towards digital forensic experts and practitioners. This survey was created in order to gain a better understanding on some of the key questions of the new field - cloud forensics - before further research and development. We aim to understand concepts such as its definition, the most challenging issues, most valuable research directions, and the critical criteria for cloud forensic capability.

Keywords: Cloud Forensics, Cloud Computing, Digital Forensics, Survey, Cloud Forensic Capability


Kindle Forensics: Acquisition & Analysis, Peter Hannay May 2011

Kindle Forensics: Acquisition & Analysis, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.

Keywords: forensics, digital forensics, kindle, mobile, embedded, ebook, ereader


Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis May 2011

Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis

Annual ADFSL Conference on Digital Forensics, Security and Law

The need to professionally and successfully conduct computer forensic investigations of incidents has never been greater. This has launched an increasing demand for a skilled computer security workforce (Locasto, et al., 2011). This paper examines the extent to which AACSB-accredited universities located in Virginia, Maryland and Washington, D.C. are working towards providing courses that will meet this demand. The authors conduct an online research of the information security courses and programs offered by the 27 AACSB-accredited business schools in the selected area.

The preliminary investigation revealed that eight of the 27 participating universities did not offer any courses in cybersecurity, …


Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston May 2011

Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston

Annual ADFSL Conference on Digital Forensics, Security and Law

Creating, building, managing a cost effective digital forensics lab including a team of qualified examiners can be a challenge for colleges [1] with multiple campuses in multiple towns, counties and states. Leaving such examination responsibilities to each of the campuses results in not only disparity in the results but more than likely excessive duplication of efforts as well as the potential for compromise of evidence. Centralizing the forensic efforts results in a team that is not subject to the political pressures of a campus and virtually eliminates the possibility of examiner favoritism. Learn what it takes to create a cost …


Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay May 2011

Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The authors were involved in extensive vulnerability assessment and penetration testing of over 15 large organisations across various industry sectors in the Perth CBD. The actual live testing involved a team of five people for approximately a four week period, and was black box testing. The scanning consisted of running network and web vulnerability tools, and in a few cases, exploiting vulnerability to establish validity of the tools. The tools were run in aggressive mode with no attempt made to deceive or avoid detection by IDS/IPS or firewalls. The aim of the testing was to determine firstly whether these organisations …


Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton May 2011

Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton

Annual ADFSL Conference on Digital Forensics, Security and Law

We present work on the design, implementation, distribution, and use of realistic forensic datasets to support digital forensics and security education. We describe in particular the “M57-Patents” scenario, a multi-modal corpus consisting of hard drive images, RAM images, network captures, and images from other devices typically found in forensics investigations such as USB drives and cellphones. Corpus creation has been performed as part of a scripted scenario; subsequently it is less “noisy” than real-world data but retains the complexity necessary to support a wide variety of forensic education activities. Realistic forensic corpora allow direct comparison of approaches and tools across …


Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker May 2011

Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker

Annual ADFSL Conference on Digital Forensics, Security and Law

Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as …


Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara May 2011

Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara

Annual ADFSL Conference on Digital Forensics, Security and Law

If information leakage occurs, an investigator is instructed to specify what documents were leaked and who leaked them. In the present work, a distributed print-out monitoring system—which consists of a virtual printer driver and print-out policy/log management servers—was developed. For easily matching the discovered (i.e., leaked) paper document with the print-out log, the virtual printer driver acquires full-text of printed-out documents by DDI hooking technique to check the content, transforms a spool file to a picture file and creates both a thumbnail and text log for forensic investigation afterwards. The log size is as only about 0.04 times bigger than …


Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman May 2011

Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman

Annual ADFSL Conference on Digital Forensics, Security and Law

OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many other resources accessed through OS X. Every password an investigator discovers in an OS X environment has the potential for use in discovering other such passwords, and any discovered passwords may also be useful in other aspects of an investigation, not directly related to the OS X environment. This research advises the use of multiple attack vectors in approaching the password problem in an OS X system, including the more generally applicable non-OS X-specific techniques such as social engineering or well-known password cracking techniques …


Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo May 2011

Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo

Annual ADFSL Conference on Digital Forensics, Security and Law

Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime expert investigating software piracy and suggests that the present software piracy forensic (or software copyright infringement investigation) approaches require amendments to take in such modifications. For this purpose, the paper also presents a format that is jargon-free, so …


Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman May 2011

Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman

Annual ADFSL Conference on Digital Forensics, Security and Law

The inevitable vulnerabilities and criminal targeting of cloud environments demand an understanding of how digital forensic investigations of the cloud can be accomplished. We present two hypothetical case studies of cloud crimes; child pornography being hosted in the cloud, and a compromised cloudbased website. Our cases highlight shortcomings of current forensic practices and laws. We describe significant challenges with cloud forensics, including forensic acquisition, evidence preservation and chain of custody, and open problems for continued research.

Keywords: Cloud computing, cloud forensics, digital forensics, case studies


A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey May 2011

A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Given the ubiquitous nature of computing, individuals now have nearly 24-7 access to the internet. People are not just going online through traditional means with a PC anymore, they are now frequently using nontraditional devices such as cell phones, smart phones, and gaming consoles. Given the increased use of gaming consoles for online access, there is also an increased use of gaming consoles to commit criminal activity. The digital forensic community has been tasked with creating new approaches for forensically analyzing gaming consoles. In this research paper the authors demonstrate different tools, both commercial and open source, available to forensically …


Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma May 2011

Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

With the huge volumes of electronic data subject to discovery in virtually every instance of litigation, time and costs of conducting discovery have become exceedingly important when litigants plan their discovery strategies. Rather than incurring the costs of having lawyers review every document produced in response to a discovery request in search of relevant evidence, a cost effective strategy for document review planning is to use statistical sampling of the database of documents to determine the likelihood of finding relevant evidence by reviewing additional documents. This paper reviews and discusses how sampling can be used to make document review more …


Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier May 2011

Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier

Annual ADFSL Conference on Digital Forensics, Security and Law

As computers and digital devices become more entrenched in our way of life, they become tools for both good and nefarious purposes. When the digital world collides with the legal world, a vast chasm is created. This paper will reflect how the legal community is failing to meet its obligation to provide adequate representation due to a lack of education about digital (computer) forensics. Whether in a civil litigation setting or a criminal setting, attorneys, prosecutors and judges have inadequate knowledge when it comes to the important questions they need to ask regarding digital evidence. Reliance on expert witnesses is …


Estimating Area And Lag Associated With Thermal Hysteresis In Cattle, F. Yang, A. M. Parkhurst May 2011

Estimating Area And Lag Associated With Thermal Hysteresis In Cattle, F. Yang, A. M. Parkhurst

Conference on Applied Statistics in Agriculture

Thermal hysteresis in cattle becomes visible when the phase diagram of body temperature (Tb) vs ambient temperature (Ta) exhibits a loop. The hysteresis loop shows a rotated elliptical pattern which depends on the lag between Tb and Ta. The area of the loop can be used to quantify the amount of heat stress during thermal challenge. Three methods to estimate the area and lag of the elliptical hysteresis loop are: linear least squares method, ellipse-specific nonlinear least squares method, and Lapshin’s analytical method. Linear least squares method uses residual least squares to estimate the coefficients of the ellipse for which …


Comparison Of Linear Mixed Models For Multiple Environment Plant Breeding Trials, Carl A. Walker, Fabiano Pita, Kimberly Garland Campbell May 2011

Comparison Of Linear Mixed Models For Multiple Environment Plant Breeding Trials, Carl A. Walker, Fabiano Pita, Kimberly Garland Campbell

Conference on Applied Statistics in Agriculture

Evaluations of multiple environment trials (MET) often reveal substantial genotype by environment interactions, and the effects of genotypes within environments are often estimated using cell means, i.e. the simple mean of the observations of each genotype in each environment. However, these estimates are inaccurate, especially for unreplicated or partially replicated trials, so alternative methods of analysis are necessary. One possible approach utilizes information, often from pedigree data, about relationships among the tested genotypes through the use of a genetic relationship matrix (GRM). Predictive accuracy may also be improved by the use of factor analytic (FA) structures for environmental covariances. In …


A Hierarchical Bayesian Approach For Detecting Differential Gene Expression In Unreplicated Rna-Sequencing Data, Sanvesh Srivastava, R. W. Doerge May 2011

A Hierarchical Bayesian Approach For Detecting Differential Gene Expression In Unreplicated Rna-Sequencing Data, Sanvesh Srivastava, R. W. Doerge

Conference on Applied Statistics in Agriculture

Next-generation sequencing technologies have emerged as a promising technology in a variety of fields, including genomics, epigenomics, and transcriptomics. These technologies play an important role in understanding cell organization and functionality. Unlike data from earlier technologies (e.g., microarrays), data from next-generation sequencing technologies are highly replicable with little technical variation. One application of next-generation sequencing technologies is RNA-Sequencing (RNA-Seq). It is used for detecting differential gene expression between different biological conditions. While statistical methods for detecting differential expression in RNA-Seq data exist, one serious limitation to these methods is the absence of biological replication. At present, the high cost of …


Bootstrap Estimation And Comparison Of An Index Of Phylogenetic Correlation, William J. Price, Bahman Shafii, Carole B. Rapo, Sanford D. Eigenbrode, John Gaskin May 2011

Bootstrap Estimation And Comparison Of An Index Of Phylogenetic Correlation, William J. Price, Bahman Shafii, Carole B. Rapo, Sanford D. Eigenbrode, John Gaskin

Conference on Applied Statistics in Agriculture

A common objective of bioinformatic analyses is to assess the similarity of species, given a biological trait or characteristic. Phylogenetic correlation is one means to achieve this objective. Such measures provide a means to evaluate evolutionary models and history as well as having potential application to ecological relationships including host preference selection. Typically, these measurements are based on the deviation of an observed phylogeny from a Brownian evolutionary model. Statistical inference for this difference is assessed through likelihood ratio tests. These tests, in turn, rely on the assumption of a Normal likelihood within the phylogenetic trait. In addition, statistical comparison …


Modeling The Root-Knot Nematode/Nutsedge Pest Complex: Perspectives From Weed Science, Nematology And Statistics, Leigh Murray, Stephen H. Thomas, Jill Schroeder, Scott Kreider, Zhining Ou, J. M. Trojan, C. Fiore May 2011

Modeling The Root-Knot Nematode/Nutsedge Pest Complex: Perspectives From Weed Science, Nematology And Statistics, Leigh Murray, Stephen H. Thomas, Jill Schroeder, Scott Kreider, Zhining Ou, J. M. Trojan, C. Fiore

Conference on Applied Statistics in Agriculture

Previous research by the authors has established that southern root-knot nematode (SRKN, Meloidogyne incognita (Kofoid & White) Chitwood) and yellow and purple nutsedge (YNS, Cyperus esculentus L. and PNS, C. rotundus L.) form a pest-complex that adversely affects a wide variety of crops in the southern and western U.S. These pests appear to have co-evolved a mutually-beneficial relationship that promotes the survival of both nematodes and weeds to the detriment of crops. Traditional management has usually targeted one pest at a time, but managing this pest complex requires that all members of the complex be managed simultaneously. A series of …


Multi-Parental Mating Design Analysis: Model Evaluation And Application In Spring Wheat, M. Kadariya, K. D. Glover, J. Wu, J. L. Gonzalez May 2011

Multi-Parental Mating Design Analysis: Model Evaluation And Application In Spring Wheat, M. Kadariya, K. D. Glover, J. Wu, J. L. Gonzalez

Conference on Applied Statistics in Agriculture

Conventional quantitative genetics studies have mainly focused on bi-parental mating systems. However, genetic potential of selected individuals within a segregating population may be limited due to only two parents being used for each cross. Multiple-parental mating systems have been proposed that involve three or four diverse parents. This provides a higher potential of combining desirable genes. Due to complexity of the data structure of multi-parental mating systems, analysis of variance (ANOVA) methods are not applicable in analysis. The objective of this study is to validate and apply a mixed linear model approach, minimum norm quadratic unbiased estimation (MINQUE), to analyze …


Estimating The Subject By Treatment Interaction In Non-Replicated Crossover Diet Studies, Matthew Kramer, Shirley C. Chen, Sarah K. Gebauer, David J. Baer May 2011

Estimating The Subject By Treatment Interaction In Non-Replicated Crossover Diet Studies, Matthew Kramer, Shirley C. Chen, Sarah K. Gebauer, David J. Baer

Conference on Applied Statistics in Agriculture

Researchers in human nutrition commonly refer to the ‘consistent’ diet effect (i.e. the main effect of diet) and an ‘inconsistent’ diet effect (i.e. a subject by diet interaction). However, due to the non-replicated designs of most studies, one can only estimate the first part using ANOVA; the latter (interaction) is confounded with the residual noise. In many diet studies, it appears that subjects do respond differently to the same diet, so the subject by diet interaction may be large. In a search of over 40,000 published human nutrition studies, most using a crossover design, we found that in none was …


Probability Models To Study The Spatial Pattern, Abundance And Diversity Of Tree Species, D. M. Gowda May 2011

Probability Models To Study The Spatial Pattern, Abundance And Diversity Of Tree Species, D. M. Gowda

Conference on Applied Statistics in Agriculture

Ecological communities are composed of complex vegetation that differs from community to community and also within the community. The variability of tree species in the community in relation to their environments can be studied by using different statistical tools. The present study was conducted to describe and also to quantify the spatial pattern, abundance and diversity of tree species in the Western Ghats of Karnataka. The spatial pattern of tree species was studied by using Poisson and Negative binomial distributions. Results indicate that most of the selected tree species followed Negative binomial distribution having clumped pattern. The Species abundance distribution …


Spatio-Temporal Covariance Modeling With Some Arma Temporal Margins, Samuel Seth Demel, Juan Du May 2011

Spatio-Temporal Covariance Modeling With Some Arma Temporal Margins, Samuel Seth Demel, Juan Du

Conference on Applied Statistics in Agriculture

A valid covariance structure is needed to model spatio-temporal data in various disciplines, such as environmental science, climatology and agriculture. In this work we propose a collection of spatio-temporal functions whose discrete temporal margins are some autoregressive and moving average (ARMA) models, obtain a necessary and sufficient condition for them to be covariance functions. An asymmetric version of this model is also provided to account for space-time irreversibility property in practice. Finally, a spatio-temporal model with AR(2) discrete margin is fitted to wind data from Ireland for estimation and prediction, which are compared with some general existing parametric models in …