Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 271 - 300 of 11462

Full-Text Articles in Physical Sciences and Mathematics

Security Of Internet Protocol Cameras – A Case Example, William Campbell Dec 2013

Security Of Internet Protocol Cameras – A Case Example, William Campbell

Australian Digital Forensics Conference

The interaction of consumer devices and the internet, especially in relation to security, has always been tenuous. Where it is in the best interests of companies to produce products that are cheap and accessible, these traits often go against that of security. This investigation undertakes an analysis of one such device – the DCS 930L internet protocol camera from D Link. This camera is analysed for vulnerabilities, with an emphasis on those relating to authentication mechanisms. Several vulnerabilities are identified, and potential attacks based on these are discussed. Solutions or mitigations to these vulnerabilities are presented.


Including Network Routers In Forensic Investigation, Brian Cusack, Raymond Lutui Dec 2013

Including Network Routers In Forensic Investigation, Brian Cusack, Raymond Lutui

Australian Digital Forensics Conference

Network forensics concerns the identification and preservation of evidence from an event that has occurred or is likely to occur. The scope of network forensics encompasses the networks, systems and devices associated with the physical and human networks. In this paper we are assessing the forensic potential of a router in investigations. A single router is taken as a case study and analysed to determine its forensic value from both static and live investigation perspectives. In the live investigation, tests using steps from two to seven routers were used to establish benchmark expectations for network variations. We find that the …


Procedures And Tools For Acquisition And Analysis Of Volatile Memory On Android Smartphones, Andri P. Heriyanto Dec 2013

Procedures And Tools For Acquisition And Analysis Of Volatile Memory On Android Smartphones, Andri P. Heriyanto

Australian Digital Forensics Conference

Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share. Many researchers and works show the procedures and techniques for the acquisition andanalysisthe non volatile memory inmobile phones. On the other hand, the physical memory (RAM) on the smartphone might retain incriminating evidence that could be acquired and analysed by the examiner. This study reveals the proper procedure for acquiring the volatile memory inthe Android smartphone and discusses the use of Linux Memory Extraction (LiME) for dumping the volatile memory. The …


Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings, Alastair Nisbet, Maria Kim Dec 2013

Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings, Alastair Nisbet, Maria Kim

Australian Digital Forensics Conference

Alarm systems with keypads, sensors and sirens protect our homes and commercial premises from intruders. The reliability of these systems has improved over the past years but the technology has remained largely as it was 3 decades ago. With simple keypads and generally 4 digit PIN codes used for setting and unsetting the alarms, the main protection against a determined intruder is the necessity to choose robust PIN codes. However, with PIN codes chosen that are generally easy to remember and therefore relatively easy to guess, or numbers chosen to follow a pattern on the keypad, the main protection from …


Robust Watermarking Method By Systematic Block Diffusion Using Discrete Cosine Transform, Kazuo Ohzeki, Kazutaka Bannai, Yutaka Hirakawa, Kiyotsugu Sato Dec 2013

Robust Watermarking Method By Systematic Block Diffusion Using Discrete Cosine Transform, Kazuo Ohzeki, Kazutaka Bannai, Yutaka Hirakawa, Kiyotsugu Sato

Australian Digital Forensics Conference

Digital watermarks have long been considered as a security feature. A watermarking method that involves the diffusion of limited watermark information into a large part of an image’s data has high robustness. The diffused information is summed up to a single component before detecting the watermark. The summing up process eliminates small noises by an averaging effect, which improves the robustness of the embedded watermark against attack. In this field, thus far, only an asymmetrical Chirp transformation with a small block size has been attempted. In this study, a new verification experiment for a large block size of 256 × …


Identifying Bugs In Digital Forensic Tools, Brian Cusack, Alain Homewood Dec 2013

Identifying Bugs In Digital Forensic Tools, Brian Cusack, Alain Homewood

Australian Digital Forensics Conference

Bugs can be found in all code and the consequences are usually managed through upgrade releases, patches, and restarting operating systems and applications. However, in mission critical systems complete fall over systems are built to assure service continuity. In our research we asked the question, what are the professional risks of bugs in digital forensic tools? Our investigation reviewed three high use professional proprietary digital forensic tools, one in which we identified six bugs and evaluated these bug in terms of potential impacts on an investigator’s work. The findings show that yes major brand name digital forensic tools have software …


Exchanging Demands: Weaknesses In Ssl Implementations For Mobile Platforms, Peter Hannay, Clinton Carpene, Craig Valli, Andrew Woodward, Mike Johnstone Dec 2013

Exchanging Demands: Weaknesses In Ssl Implementations For Mobile Platforms, Peter Hannay, Clinton Carpene, Craig Valli, Andrew Woodward, Mike Johnstone

Australian Information Security Management Conference

The ActiveSync protocol’s implementation on some embedded devices leaves clients vulnerable to unauthorised remote policy enforcement. This paper discusses a proof of concept attack against the implementation of ActiveSync in common Smart phones including Android devices and iOS devices. A two‐phase approach to exploiting the ActiveSync protocol is introduced. Phase 1 details the usage of a man‐in‐the‐middle attack to gain a vantage point over the client device, whilst Phase 2 involves spoofing the server‐side ActiveSync responses to initiate the unauthorised policy enforcement. These vulnerabilities are demonstrated by experiment, highlighting how the system can be exploited to perform a remote factory …


A Simulation-Based Study Of Server Location Selection Rules In Manets Utilising Threshold Cryptography, Alastair Nisbet Dec 2013

A Simulation-Based Study Of Server Location Selection Rules In Manets Utilising Threshold Cryptography, Alastair Nisbet

Australian Information Security Management Conference

Truly Ad Hoc wireless networks where a spontaneous formation of a network occurs and there is no prior knowledge of nodes to each other present significant security challenges, especially as entirely online configuration of nodes with encryption keys must be performed. Utilising threshold cryptography in this type of MANET can greatly increase the security by requiring servers to collaborate to form a single Certificate Authority (CA). In this type of CA responsibility for certificate services is shared between a threshold of servers, greatly increasing security and making attack against the CA considerably more difficult. Choosing which nodes to take on …


The Femur Of Orrorin Tugenensis Exhibits Morphometric Affinities With Both Miocene Apes And Later Hominins, Sergio Almecija, Melissa Tallman, David M. Alba, Marta Pina, Salvador Moya-Sola, William L. Jungers Dec 2013

The Femur Of Orrorin Tugenensis Exhibits Morphometric Affinities With Both Miocene Apes And Later Hominins, Sergio Almecija, Melissa Tallman, David M. Alba, Marta Pina, Salvador Moya-Sola, William L. Jungers

Peer Reviewed Articles

Orrorin tugenensis (Kenya, ca. 6 Ma) is one of the earliest putative hominins. Its proximal femur, BAR 1002′00, was originally described as being very human-like, although later multivariate analyses showed an australopith pattern. However, some of its traits (for example, laterally protruding greater trochanter, medially oriented lesser trochanter and presence of third trochanter) are also present in earlier Miocene apes. Here, we use geometric morphometrics to reassess the morphological affinities of BAR 1002′00 within a large sample of anthropoids (including fossil apes and hominins) and reconstruct hominoid proximal femur evolution using squared-change parsimony. Our results indicate that both hominin …


Lack Of Rnase L Attenuates Macrophage Functions, Xin Yi, Chun Zeng, Hongli Liu, Xiaoli Chen, Ping Zhang, Boo Seok Yun, Ge Jin, Aimin Zhou Dec 2013

Lack Of Rnase L Attenuates Macrophage Functions, Xin Yi, Chun Zeng, Hongli Liu, Xiaoli Chen, Ping Zhang, Boo Seok Yun, Ge Jin, Aimin Zhou

Chemistry Faculty Publications

Background: Macrophages are one of the major cell types in innate immunity against microbial infection. It is believed that the expression of proinflammatory genes such as tumor necrosis factor-α (TNF-α), interleukin (IL)-1β, IL–6, and cyclooxygenase-2 (Cox-2) by macrophages is also crucial for activation of both innate and adaptive immunities. RNase L is an interferon (IFN) inducible enzyme which is highly expressed in macrophages. It has been demonstrated that RNase L regulates the expression of certain inflammatory genes. However, its role in macrophage function is largely unknown. Methodology: Bone marrow-derived macrophages (BMMs) were generated from RNase L+/+and −/− mice. The migration …


Adjusted Tornado Probabilities, Holly M. Widen, James B. Elsner, Cameron Amrine, Rizalino B. Cruz, Erik Fraza, Laura Michaels, Loury Migliorelli, Brendan Mulholland, Michael Patterson, Sarah Strazzo, Guang Xing Dec 2013

Adjusted Tornado Probabilities, Holly M. Widen, James B. Elsner, Cameron Amrine, Rizalino B. Cruz, Erik Fraza, Laura Michaels, Loury Migliorelli, Brendan Mulholland, Michael Patterson, Sarah Strazzo, Guang Xing

Publications

Tornado occurrence rates computed from the available reports are biased low relative to the unknown true rates. To correct for this low bias, the authors demonstrate a method to estimate the annual probability of being struck by a tornado that uses the average report density estimated as a function of distance from nearest city/town center. The method is demonstrated on Kansas and then applied to 15 other tornado-prone states from Nebraska to Tennessee. States are ranked according to their adjusted tornado rate and comparisons are made with raw rates published elsewhere. The adjusted rates, expressed as return periods, arestates, including …


Keeney, Sean Carpenter (Sc 1259), Manuscripts & Folklife Archives Dec 2013

Keeney, Sean Carpenter (Sc 1259), Manuscripts & Folklife Archives

Manuscript Collection Finding Aids

Finding aid only for Manuscripts Small Collection 1259. “My Experience of ‘Andrew,’” by Sean Keeney, Dade County, Florida, relating the effect on him and his family of Hurricane Andrew, which struck the area on 24 August 1992. Includes biographical data on Keeney.


The Halo Occupation Distribution Of X-Ray-Bright Active Galactic Nuclei: A Comparison With Luminous Quasars, Jonathan Richardson, Suchetana Chatterjee, Zheng Zheng, Adam D. Myers, Ryan Hickox Dec 2013

The Halo Occupation Distribution Of X-Ray-Bright Active Galactic Nuclei: A Comparison With Luminous Quasars, Jonathan Richardson, Suchetana Chatterjee, Zheng Zheng, Adam D. Myers, Ryan Hickox

Dartmouth Scholarship

We perform halo occupation distribution (HOD) modeling of the projected two-point correlation function (2PCF) of high-redshift (z~1.2) X-ray-bright active galactic nuclei (AGN) in the XMM-COSMOS field measured by Allevato et al. The HOD parameterization is based on low-luminosity AGN in cosmological simulations. At the median redshift of z~1.2, we derive a median mass of (1.02+0.21/-0.23)x10^{13} Msun/h for halos hosting central AGN and an upper limit of ~10% on the AGN satellite fraction. Our modeling results indicate (at the 2.5-sigma level) that X-ray AGN reside in more massive halos compared to more bolometrically luminous, optically-selected quasars at similar redshift. The modeling …


Magnetic Inhibition Of Convection And The Fundamental Properties Of Low-Mass Stars. I. Stars With A Radiative Core, Gregory A. Feiden, Brian Chaboyer Dec 2013

Magnetic Inhibition Of Convection And The Fundamental Properties Of Low-Mass Stars. I. Stars With A Radiative Core, Gregory A. Feiden, Brian Chaboyer

Dartmouth Scholarship

Magnetic fields are hypothesized to inflate the radii of low-mass stars—defined as less massive than 0.8 M —in detached eclipsing binaries (DEBs). We investigate this hypothesis using the recently introduced magnetic Dartmouth stellar evolution code. In particular, we focus on stars thought to have a radiative core and convective outer envelope by studying in detail three individual DEBs: UV Psc, YY Gem, and CU Cnc. Our results suggest that the stabilization of thermal convection by a magnetic field is a plausible explanation for the observed model-radius discrepancies. However, surface magnetic field strengths required by the models are significantly stronger …


Minimum Rank Problems For Cographs, Nicole Andrea Malloy Dec 2013

Minimum Rank Problems For Cographs, Nicole Andrea Malloy

Theses and Dissertations

Let G be a simple graph on n vertices, and let S(G) be the class of all real-valued symmetric nxn matrices whose nonzero off-diagonal entries occur in exactly the positions corresponding to the edges of G. The smallest rank achieved by a matrix in S(G) is called the minimum rank of G, denoted mr(G). The maximum nullity achieved by a matrix in S(G) is denoted M(G). For each graph G, there is an associated minimum rank class, MR(G) consisting of all matrices A in S(G) with rank A = mr(G). Although no restrictions are applied to the diagonal entries of …


Localized Bases For Kernel Spaces On The Unit Sphere, E. Fuselier, T. Hangelbroek, F. J. Narcowich, J. D. Ward, G. B. Wright Dec 2013

Localized Bases For Kernel Spaces On The Unit Sphere, E. Fuselier, T. Hangelbroek, F. J. Narcowich, J. D. Ward, G. B. Wright

Grady Wright

Approximation/interpolation from spaces of positive definite or conditionally positive definite kernels is an increasingly popular tool for the analysis and synthesis of scattered data and is central to many meshless methods. For a set of N scattered sites, the standard basis for such a space utilizes N globally supported kernels; computing with it is prohibitively expensive for large N. Easily computable, well-localized bases with “small-footprint” basis elements—i.e., elements using only a small number of kernels—have been unavailable. Working on S2, with focus on the restricted surface spline kernels (e.g., the thin-plate splines restricted to the sphere), we construct easily computable, …


U.S. Drought Monitor, December 3, 2013, Michael J. Brewer Dec 2013

U.S. Drought Monitor, December 3, 2013, Michael J. Brewer

United States Agricultural Commodities in Drought Archive

Drought map of U.S. for December 3, 2013 (12/3/13) plus: U.S. crop areas experiencing drought (map), Approximate percentage of crop located in drought, by state (bar graph), Percent of crop area located in drought, past 52 weeks (line graph) for: Corn, Soybeans, Hay, Cattle, Winter wheat.


Drainage Structure Datasets And Effects On Lidar-Derived Surface Flow Modeling, Ruopu Li, Zhenghong Tang, Xu Li, Jessie Winter Dec 2013

Drainage Structure Datasets And Effects On Lidar-Derived Surface Flow Modeling, Ruopu Li, Zhenghong Tang, Xu Li, Jessie Winter

School of Natural Resources: Faculty Publications

With extraordinary resolution and accuracy, Light Detection and Ranging (LiDAR)-derived digital elevation models (DEMs) have been increasingly used for watershed analyses and modeling by hydrologists, planners and engineers. Such high-accuracy DEMs have demonstrated their effectiveness in delineating watershed and drainage patterns at fine scales in low-relief terrains. However, these high-resolution datasets are usually only available as topographic DEMs rather than hydrologic DEMs, presenting greater land roughness that can affect natural flow accumulation. Specifically, locations of drainage structures such as road culverts and bridges were simulated as barriers to the passage of drainage. This paper proposed a geospatial method for producing …


Electron-Impact Vibrational Excitation Of Vibrationally Excited H2 Molecules Involving The Resonant 2(Sigma)G+ Rydberg-Excited Electronic State, R Celiberto, R. K. Janev, V Laporta, J Tennyson, J. M. Wadehra Dec 2013

Electron-Impact Vibrational Excitation Of Vibrationally Excited H2 Molecules Involving The Resonant 2(Sigma)G+ Rydberg-Excited Electronic State, R Celiberto, R. K. Janev, V Laporta, J Tennyson, J. M. Wadehra

Physics and Astronomy Faculty Research Publications

Electron-impact theoretical cross sections and rate coefficients for vibrational excitation of vibrationally excited H2 molecules, occurring through the H−2 resonant species in the 2Σ+g Rydberg-excited electronic state, are presented. The cross sections are calculated as functions of the incident electron energy by adopting the local-complex-potential model for resonant collisions and by using ab initio calculated molecular potentials and resonance widths. The calculations have been extended to all possible vibrational transitions linking all 15 vibrational levels of the electronic ground state of the H2 molecule. The corresponding rate coefficients are also obtained as a function of the electron temperature by assuming …


The Applicability Of Greulich And Pyle Atlas To Assess Skeletal Age For Four Ethnic Groups, Sameem Abdul Kareem Dec 2013

The Applicability Of Greulich And Pyle Atlas To Assess Skeletal Age For Four Ethnic Groups, Sameem Abdul Kareem

Sameem Abdul Kareem

Background: Recently, determination of skeletal age, defined as the assessment of bone age, has rapidly become an important task between forensic experts and radiologists. The GreulichePyle (GP) atlas is one of the most frequently used methods for the assessment of skeletal age around the world. After presentation of the GP approach for the estimation of the bone age, much research has been conducted to examine the usability of this method in various geographic or ethnic categories. This study investigates on a small-scale and compares the reliability of the GP atlas for assessment of the bone age for four ethnic groups …


Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith Dec 2013

Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith

AFIT Patents

A method of managing patient care and emergency response following a Chemical, Biological, Radiological, or Nuclear Explosive (CBRNE) attack and maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA). The method including identifying each patient with a unique patient identifier, the identifier based upon the geospatial location of the patient, the geospatial location including at least the latitude and longitude of the patient when first treated, the unique patient identifier being part of patient data. Providing a collection point of patient data to form a patient data database where in the patient location data may be used to …


A Comparison Of Evidence Fusion Rules For Situation Recognition In Sensor-Based Environments, Susan Mckeever, Juan Ye Dec 2013

A Comparison Of Evidence Fusion Rules For Situation Recognition In Sensor-Based Environments, Susan Mckeever, Juan Ye

Conference papers

Dempster-Shafer (DS) theory, and its associated Dempster rule of combination, has been widely used to determine belief based on uncertain evi-dence sources. Variations to the original Dempster rule of combination have appeared in the literature to support particular scenarios where unreliable results may result from the use of original DS theory. While theoretical explanations of the rule variations are explained, there is a lack of empirical comparisons of the DS theory and its variations against real data sets. In this work, we examine several variations to DS theory. Using two real-world sensor data sets, we com-pare the performance of DS …


Optimization And Spatial Queueing Models To Support Multi-Server Dispatching Policies With Multiple Servers Per Station, Sardar Ansari Dec 2013

Optimization And Spatial Queueing Models To Support Multi-Server Dispatching Policies With Multiple Servers Per Station, Sardar Ansari

Theses and Dissertations

In this thesis, we propose novel optimization and spatial queueing models that expand the currently existing methods by allowing multiple servers to be located at the same station and multiple servers to be dispatched to a single call. In particular, a mixed integer linear programming (MILP) model is introduced that determines how to locate and dispatch ambulances such that the coverage level is maximized. The model allows multiple servers to be located at the same station and balances the workload among them while maintaining contiguous first priority response districts. We also propose an extension to the approximate Hypercube queueing model …


National Physics Association Honors Spalding, Kim Hill Dec 2013

National Physics Association Honors Spalding, Kim Hill

News and Events

No abstract provided.


Veritas Observations Of The Microquasar Cygnus X-3, P. T. Reynolds, Et Al Dec 2013

Veritas Observations Of The Microquasar Cygnus X-3, P. T. Reynolds, Et Al

Physical Sciences Publications

We report results from TeV gamma-ray observations of the microquasar Cygnus X-3. The observations were made with the Very Energetic Radiation Imaging Telescope Array System (VERITAS) over a time period from 2007 June 11 to 2011 November 28. VERITAS is most sensitive to gamma rays at energies between 85 GeV and 30 TeV. The effective exposure time amounts to a total of about 44 hr, with the observations covering six distinct radio/X-ray states of the object. No significant TeV gamma-ray emission was detected in any of the states, nor with all observations combined. The lack of a positive signal, especially …


The Design And Synthesis Of Magnetic Nanocomposites, Daniel Hudgins Dec 2013

The Design And Synthesis Of Magnetic Nanocomposites, Daniel Hudgins

Theses and Dissertations

Magnetism lies at the core of modern technology and can be found in industries such as oil refining, automotive, telecommunications, personal electronics, and power generation that are integral to our day to day lives. This permeation into everyday life has been enhanced in the past several decades with improvements in material design based upon the principles of nanotechnology leading to smaller, faster, and more efficient devices. The presented research will discuss the synthesis and processing of multiple magnetic nanoparticle structures designed for the enhancement of various, application specific, properties. In the first experiments a tunable core/shell structure was developed with …


Peakon, Pseudo-Peakon, And Cuspon Solutions For Two Generalized Camassa- Holm Equations, Jibin Li, Zhijun Qiao Dec 2013

Peakon, Pseudo-Peakon, And Cuspon Solutions For Two Generalized Camassa- Holm Equations, Jibin Li, Zhijun Qiao

School of Mathematical and Statistical Sciences Faculty Publications and Presentations

In this paper, we study peakon, cuspon, and pseudo-peakon solutions for two generalized Camassa-Holm equations. Based on the method of dynamical systems, the two generalized Camassa-Holm equations are shown to have the parametric representations of the solitary wave solutions such as peakon, cuspon, pseudo-peakons, and periodic cusp solutions. In particular, the pseudo-peakon solution is for the first time proposed in our paper. Moreover, when a traveling system has a singular straight line and a heteroclinic loop, under some parameter conditions, there must be peaked solitary wave solutions appearing.


Estimating Norms Of Commutators [Dataset], Terry A. Loring, Freddy Vides Dec 2013

Estimating Norms Of Commutators [Dataset], Terry A. Loring, Freddy Vides

Math and Statistics Datasets

We find estimates on the norm of a commutator of the form [f(x),y] in terms of the norm of [x,y], assuming that x and y are bounded linear operators on Hilbert space, with x normal and with spectrum within the domain of f. In particular we discuss |[x^2,y]| and |[x^{1/2},y]| for 0leq x leq 1. For larger values of delta = |[x,y]| we can rigorous calculate the best possible upper bound |[f(x),y]| leq eta_f(delta) for many f. In other cases we have conducted numerical experiments that strongly suggest that we have in many cases found the correct formula for the …


Effects Of External Radiation Fields On Line Emission—Application To Star-Forming Regions, Marios Chatzikos, Gary J. Ferland, R. J. R. Williams, Ryan Porter, P. A. M. Vanhoof Dec 2013

Effects Of External Radiation Fields On Line Emission—Application To Star-Forming Regions, Marios Chatzikos, Gary J. Ferland, R. J. R. Williams, Ryan Porter, P. A. M. Vanhoof

Physics and Astronomy Faculty Publications

A variety of astronomical environments contain clouds irradiated by a combination of isotropic and beamed radiation fields. For example, molecular clouds may be irradiated by the isotropic cosmic microwave background, as well as by a nearby active galactic nucleus. These radiation fields excite atoms and molecules and produce emission in different ways. We revisit the escape probability theorem and derive a novel expression that accounts for the presence of external radiation fields. We show that when the field is isotropic the escape probability is reduced relative to that in the absence of external radiation. This is in agreement with previous …


Numerical Studies Of The Generalized L1 Greedy Algorithm For Sparse Signals, Fangjun Arroyo, Edward Arroyo, Xiezhang Li, Jiehua Zhu Dec 2013

Numerical Studies Of The Generalized L1 Greedy Algorithm For Sparse Signals, Fangjun Arroyo, Edward Arroyo, Xiezhang Li, Jiehua Zhu

Xiezhang Li

The generalized l1 greedy algorithm was recently introduced and used to reconstruct medical images in computerized tomography in the compressed sensing framework via total variation minimization. Experimental results showed that this algorithm is superior to the reweighted l1-minimization and l1 greedy algorithms in reconstructing these medical images. In this paper the effectiveness of the generalized l1 greedy algorithm in finding random sparse signals from underdetermined linear systems is investigated. A series of numerical experiments demonstrate that the generalized l1 greedy algorithm is superior to the reweighted l1-minimization and l1 greedy algorithms in the successful recovery of randomly generated Gaussian sparse …