Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1621 - 1650 of 13646

Full-Text Articles in Physical Sciences and Mathematics

Tidal-, Wind-, And Buoyancy-Driven Dynamics In The Barataria Estuary And Its Impact On Estuarine-Shelf Exchange Processes, Linlin Cui Oct 2018

Tidal-, Wind-, And Buoyancy-Driven Dynamics In The Barataria Estuary And Its Impact On Estuarine-Shelf Exchange Processes, Linlin Cui

LSU Doctoral Dissertations

A three-dimensional, high-resolution, Finite-Volume Coastal Ocean Model (FVCOM) was used to study the dynamics of Barataria Estuary located in the Southeastern Louisiana. Three numerical experiments with different discharge scenarios, including the actual discharge (average ~ 160 m3 s-1) from the Davis Pond Diversion (DPD) over three months from April to June 2010, no discharge (NO), and the proposed Mid-Barataria Diversion (MBD) with a constant discharge of 850 m3 s-1, were conducted to investigate the impacts of river diversions on salinity gradients and residence times in the estuary. The three-month average salinity indicated that surface …


Cross-Referencing Social Media And Public Surveillance Camera Data For Disaster Response, Chittayong Surakitbanharn,, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal Oct 2018

Cross-Referencing Social Media And Public Surveillance Camera Data For Disaster Response, Chittayong Surakitbanharn,, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

Physical media (like surveillance cameras) and social media (like Instagram and Twitter) may both be useful in attaining on-the-ground information during an emergency or disaster situation. However, the intersection and reliability of both surveillance cameras and social media during a natural disaster are not fully understood. To address this gap, we tested whether social media is of utility when physical surveillance cameras went off-line during Hurricane Irma in 2017. Specifically, we collected and compared geo-tagged Instagram and Twitter posts in the state of Florida during times and in areas where public surveillance cameras went off-line. We report social media content …


The Effect Of Sub-Facet Scale Geometry On Vertical Facet Temperatures In Urban Street Canyons, Rainer V.J. Hilland Oct 2018

The Effect Of Sub-Facet Scale Geometry On Vertical Facet Temperatures In Urban Street Canyons, Rainer V.J. Hilland

Electronic Thesis and Dissertation Repository

Surface temperature plays a key role in many micro-scale urban processes. Walls comprise a significant percentage of the urban surface, yet are under-represented by many methods of thermal remote sensing and not considered in detail by micro-scale surface temperature mod- els. This thesis presents a novel method of mobile thermal observation performed in urban street canyons in London, ON that uses a thermal imager as well as a visual spectrum camera to provide dense spatial and temporal resolution of micro-scale wall temperature distributions. Images are manually classified by a series of nominal variables and the resulting data set discusses the …


Observation Of High-Energy Gamma-Rays With The Calorimetric Electron Telescope (Calet) On-Board The International Space Station, Nicholas Wade Cannady Oct 2018

Observation Of High-Energy Gamma-Rays With The Calorimetric Electron Telescope (Calet) On-Board The International Space Station, Nicholas Wade Cannady

LSU Doctoral Dissertations

The CALorimetric Electron Telescope (CALET) is a multi-instrument high-energy astrophysics observatory deployed to the International Space Station (ISS) in August 2015. The primary instrument is the calorimeter (CAL), which is intended for measurement of the cosmic ray electron flux in the energy range 10 GeV - 20 TeV. The CAL is also sensitive to gamma-rays in the energy range 1 GeV - 10 TeV and protons and nuclei up to PeV energies. Also present on the CALET payload are an Advanced Stellar Compass (ASC) for the fine determination of the pointing direction and the CALET Gamma-ray Burst Monitor (CGBM) for …


Keyword-Based Patent Citation Prediction Via Information Theory, Farshad Madani, Martin Zwick, Tugrul U. Daim Oct 2018

Keyword-Based Patent Citation Prediction Via Information Theory, Farshad Madani, Martin Zwick, Tugrul U. Daim

Engineering and Technology Management Faculty Publications and Presentations

Patent citation shows how a technology impacts other inventions, so the number of patent citations (backward citations) is used in many technology prediction studies. Current prediction methods use patent citations, but since it may take a long time till a patent is cited by other inventors, identifying impactful patents based on their citations is not an effective way. The prediction method offered in this article predicts patent citations based on the content of patents. In this research, Reconstructability Analysis (RA), which is based on information theory and graph theory, is applied to predict patent citations based on keywords extracted from …


Quantitative Appraisal Of Non-Irrigated Cropland In South Dakota, Shelby Riggs Oct 2018

Quantitative Appraisal Of Non-Irrigated Cropland In South Dakota, Shelby Riggs

Honors Theses

This appraisal attempts to remove subjectivity from the appraisal process and replace it with quantitative analysis of known data to generate a fair market value of the subject property. Two methods of appraisal were used, the income approach and the comparable sales approach. For the income approach, I used the average cash rent for the region, the current property taxes for the subject property, and a capitalization rate based on Stokes' (2018) capitalization rate formula to arrive at my income-based valuation. For the comparable sales approach, I utilized Stokes' (2018) research in optimization modeling to estimate a market value for …


The 'New Normal' Of Flooding In Portsmouth, Virginia: Perspectives, Experiences, And Adaptive Responses Of Residents And Business Owners In Low To Moderate-Income Communities, Donta Council, Michelle Covi, Wie Yusuf, Joshua Behr, Makayla Brown, Old Dominion University Resilience Collaborative, Virginia Sea Grant Oct 2018

The 'New Normal' Of Flooding In Portsmouth, Virginia: Perspectives, Experiences, And Adaptive Responses Of Residents And Business Owners In Low To Moderate-Income Communities, Donta Council, Michelle Covi, Wie Yusuf, Joshua Behr, Makayla Brown, Old Dominion University Resilience Collaborative, Virginia Sea Grant

Presentations, Lectures, Posters, Reports

[First three paragraphs from the Summary]

This project is a part of a broader initiative - the Resilience Adaptation Feasibility Tool (RAFT) - that addresses the daunting challenges coastal communities are facing related to sea level rise and climate change (more information about RAFT is available here: https://ien.virginia.edu/raft).

This aim of this project was to investigate how residents and business owners in low-to-moderate income communities in Portsmouth, Virginia cope with flooding, and to assess implications for how the local government can better engage with residents to better meet their information needs so they can be more resilient to flooding. The …


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady Oct 2018

Hijacking Wireless Communications Using Wifi Pineapple Nano As A Rogue Access Point, Shawn J. Witemyre, Tamirat T. Abegaz, Bryson R. Payne, Ash Mady

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points are an effective solution for building scalable, flexible, mobile networks. The problem with these access points is often the lack of security. Users regularly connect to wireless access points without thinking about whether they are genuine or malicious. Moreover, users are not aware of the types of attacks that can come from “rogue” access points set up by attackers and what information can be captured by them. Attackers use this advantage to gain access to users’ confidential information. The objective of this study is to examine the effectiveness of the WiFi Pineapple NANO used as a rogue …


Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy Oct 2018

Towards A Development Of Predictive Models For Healthcare Hipaa Security Rule Violation Fines, Jim Furstenberg, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

The Health Insurance Portability and Accountability Act’s (HIPAA) Security Rule (SR) mandate provides a national standard for the protection of electronic protected health information (ePHI). The SR’s standards provide healthcare covered entities (CEs’) flexibility in how to meet the standards because the SR regulators realized that all health care organizations are not the same. However, the SR requires CEs’ to implement reasonable and appropriate safeguards, as well as security controls that protect the confidentiality, integrity, and availability (CIA) of their ePHI data. However, compliance with the HIPAA SR mandates are confusing, complicated, and can be costly to CEs’. Flexibility in …


Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black Oct 2018

Using Project Management Knowledge And Practice To Address Digital Forensic Investigation Challenges, Steven S. Presley, Jeffrey P. Landry, Michael Black

KSU Proceedings on Cybersecurity Education, Research and Practice

The management of digital forensics investigations represents a unique challenge. The field is relatively new, and combines the technical challenges of Information Systems with the legal challenges of forensics investigations. The challenges for the Digital Forensics Investigators and the organizations they support are many. This research effort examines the characteristics and challenges of Digital Forensics Investigations and compares them with the features and knowledge areas of project management. The goal was to determine if project management knowledge, as defined in a common body of knowledge, would be helpful in addressing digital forensics investigation challenges identified in the literature. The results …


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity analysts.


Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau Oct 2018

Capturing The Existential Cyber Security Threats From The Sub-Saharan Africa Zone Through Literature Database, Samuel B. Olatunbosun, Nathanial J. Edwards, Cytyra D. Martineau

KSU Proceedings on Cybersecurity Education, Research and Practice

Abstract - The Internet brought about the phenomenon known as Cyber-space which is boundless in nature. It is one of the fastest-growing areas of technical infrastructure development over the past decade. Its growth has afforded everyone the opportunity to carry out one or more transactions for personal benefits. The African continent; often branded as ‘backward’ by the Western press has been able to make substantial inroads into the works of Information and Computer Technology (ICT). This rapid transition by Africans into ICT power has thus opened up the opportunities for Cybercriminal perpetrators to seek and target victims worldwide including America …


Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards Oct 2018

Laboratory Exercises To Accompany Industrial Control And Embedded Systems Security Curriculum Modules, Gretchen Richards

KSU Proceedings on Cybersecurity Education, Research and Practice

The daily intrusion attempts and attacks on industrial control systems (ICS) and embedded systems (ES) underscore the criticality of the protection of our Critical Infrastructures (CIs). As recent as mid-July 2018, numerous reports on the infiltration of US utility control rooms by Russian hackers have been published. These successful infiltration and possible manipulation of the utility companies could easily translate to a devastating attack on our nation’s power grid and, consequently, our economy and well-being. Indeed, the need to secure the control and embedded systems which operate our CIs has never been so pronounced. In our attempt to address this …


A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson Oct 2018

A Blockchain-Based Security-Oriented Framework For Cloud Federation, Ramandeep Kaur Sandhu, Kweku Muata A. Osei-Bryson

KSU Proceedings on Cybersecurity Education, Research and Practice

Cloud federations have been formed to share the services, prompt and support cooperation, as well as interoperability among their already deployed cloud systems. However, the creation and management of the cloud federations lead to various security issues such as confidentially, integrity and availability of the data. Despite the access control policies in place, an attacker may compromise the communication channel processing the access requests and the decisions between the access control systems and the members(users) and vice-versa. In cloud federation, the rating of the services offered by different cloud members becomes integral to providing the users with the best quality …


Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros Oct 2018

Information Privacy Concerns In The Age Of Internet Of Things, Madhav Sharma, David Biros

KSU Proceedings on Cybersecurity Education, Research and Practice

Internet of things (IoT) offer new opportunities for advancement in many domains including healthcare, home automation, manufacturing and transportation. In recent years, the number of IoT devices have exponentially risen and this meteoric rise is poised to continue according to the industry. Advances in the IoT integrated with ambient intelligence are intended to make our lives easier. Yet for all these advancements, IoT also has a dark side. Privacy and security were already priorities when personal computers, devices and work stations were the only point of vulnerability to personal information, however, with the ubiquitous nature of smart technologies has increased …


Teaching Cybersecurity In An Undergraduate Engineering Course, Xiuli Qu, Xiaohong Yuan Oct 2018

Teaching Cybersecurity In An Undergraduate Engineering Course, Xiuli Qu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizations create a huge amount of sensitive and confidential data, which must be protected from unauthorized access or disclosure. Nowadays, most organizations store their business data in digital formats. With the increasing use of digital data, data breaches are more often and serious in recent years. Therefore, it is very important for next-generation engineers to be aware of the importance of information security, and be able to recognize vulnerabilities and threats to an information system and design user-friendly and effective security measures. To achieve it, two modules of information systems security, including lectures and in-class labs, were developed and taught …


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne Oct 2018

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …


Car Hacking: Can It Be That Simple?, Bryson Payne Oct 2018

Car Hacking: Can It Be That Simple?, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoT) has expanded the reach of technology at work, at home, and even on the road. As Internet-connected and self-driving cars become more commonplace on our highways, the cybersecurity of these “data centers on wheels” is of greater concern than ever. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety. This article describes the integration of a module on car hacking into a semester-long ethical hacking cybersecurity course, including full …


Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy Oct 2018

Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

Many small businesses struggle to improve their cybersecurity posture despite the risk to their business. Small businesses lacking adequate protection from cyber threats, or a business continuity strategy to recover from disruptions, have a very high risk of loss due to a cyberattack. These cyberattacks, either deliberate or unintentional, can become costly when a small business is not prepared. This developmental research is focused on the relationship between two constructs that are associated with readiness and resilience of small businesses based on their cybersecurity planning, implementation, as well as response activities. A Cybersecurity Preparedness-Risk Taxonomy (CyPRisT) is proposed using the …


Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan Oct 2018

Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is a hands-on (HandsOn) …


Estimation Of Atmospheric Turbulence Using Differential Motion Of Extended Features In Time-Lapse Imagery, Santasri Bose-Pillai, Jack E. Mccrae, Christopher A. Rice, Ryan A. Wood, Conner E. Murphy, Steven T. Fiorino Oct 2018

Estimation Of Atmospheric Turbulence Using Differential Motion Of Extended Features In Time-Lapse Imagery, Santasri Bose-Pillai, Jack E. Mccrae, Christopher A. Rice, Ryan A. Wood, Conner E. Murphy, Steven T. Fiorino

Faculty Publications

We address the design, development, and testing of a pointer/tracker as a probe beam for the purpose of making high-speed, aero-optical measurements of the flow over a scaled beam director turret. The tracker uses retro-reflection of the probe beam off of a Reflexite annulus surrounding the turret. The constraints of the design required a near-total-commercial off the shelf system that could be quickly installed and removed in a rented aircraft. Baseline measurements of environmental vibrations are used to predict pointing performance; mitigation of line-of-sight jitter on the probe beam is achieved through passive isolation and the design of relay optics. …


Impacts Of Climate Change And Bioenergy Markets On The Profitability Of Slash Pine Pulpwood Production In The Southeastern United States, Andres Susaeta, Pankaj Lal Oct 2018

Impacts Of Climate Change And Bioenergy Markets On The Profitability Of Slash Pine Pulpwood Production In The Southeastern United States, Andres Susaeta, Pankaj Lal

Department of Earth and Environmental Studies Faculty Scholarship and Creative Works

In this study, we assessed the impacts of climate change on the production of pulpwood and biomass for bioenergy, and the profitability of slash pine stands in the Southeastern United States. We employed the 3-PG (Physiological Processes Predicting Growth) model to determine the effects of future climates on forest growth and integrated it with a stand-level economic model to determine their impacts on optimal forestmanagement. We found that the average production of pulpwood increased for all sites by 7.5 m 3 ha -1 for all climatic scenarios and productivity conditions. In the case of forest biomass for bioenergy, the average …


Impacts Of Climate Change And Bioenergy Markets On The Profitability Of Slash Pine Pulpwood Production In The Southeastern United States, Andrea Susaeta, Pankaj Lal Oct 2018

Impacts Of Climate Change And Bioenergy Markets On The Profitability Of Slash Pine Pulpwood Production In The Southeastern United States, Andrea Susaeta, Pankaj Lal

Department of Earth and Environmental Studies Faculty Scholarship and Creative Works

In this study, we assessed the impacts of climate change on the production of pulpwood and biomass for bioenergy, and the profitability of slash pine stands in the Southeastern United States. We employed the 3-PG (Physiological Processes Predicting Growth) model to determine the effects of future climates on forest growth and integrated it with a stand-level economic model to determine their impacts on optimal forest management. We found that the average production of pulpwood increased for all sites by 7.5 m3 ha−1 for all climatic scenarios and productivity conditions. In the case of forest biomass for bioenergy, the …


Digital Identity, Philip Andreae Oct 2018

Digital Identity, Philip Andreae

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Why Managing 3rd Party Cybersecurity Risk Is A Matter Of National Security, Keith Deininger Oct 2018

Why Managing 3rd Party Cybersecurity Risk Is A Matter Of National Security, Keith Deininger

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Six Things I Wish New Employees Knew, Brian Albertson Oct 2018

Six Things I Wish New Employees Knew, Brian Albertson

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Why Networks Still Matter, Tim O'Neill Oct 2018

Why Networks Still Matter, Tim O'Neill

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


Beyond The Classroom - What Students Need To Know, Will Alexander Oct 2018

Beyond The Classroom - What Students Need To Know, Will Alexander

KSU Proceedings on Cybersecurity Education, Research and Practice

No abstract provided.


The Firece Green Fire: Vol. 9 Issue 7, Wofford College Environmental Studies Program Oct 2018

The Firece Green Fire: Vol. 9 Issue 7, Wofford College Environmental Studies Program

The Fierce Green Fire

No abstract provided.