Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 142111 - 142140 of 302965

Full-Text Articles in Physical Sciences and Mathematics

A Charged Fusion Product Diagnostic For A Spherical Tokamak, Ramona V. Perez May 2015

A Charged Fusion Product Diagnostic For A Spherical Tokamak, Ramona V. Perez

FIU Electronic Theses and Dissertations

Designs for future nuclear fusion power reactors rely on the ability to create a stable plasma (hot ionized gas of hydrogen isotopes) as a medium with which to sustain nuclear fusion reactions. My dissertation work involves designing, constructing, testing, installing, operating, and validating a new diagnostic for spherical tokamaks, a type of reactor test facility. Through detecting charged particles emitted from the plasma, this instrument can be used to study fusion reaction rates within the plasma and how they are affected by plasma perturbations. Quantitatively assessing nuclear fusion reaction rates at specific locations inside the plasma and as a function …


The Response Of Zooplankton Communities In Montane Lakes Of Different Fish Stocking Histories To Atmospheric Nitrogen Deposition Simulations, Jeffrey Thomas Brittain May 2015

The Response Of Zooplankton Communities In Montane Lakes Of Different Fish Stocking Histories To Atmospheric Nitrogen Deposition Simulations, Jeffrey Thomas Brittain

Dissertations and Theses

Freshwater ecosystems are subject to a wide variety of stressors, which can have complex interactions and result in ecological surprises. Non-native fish introductions have drastically reduced the number of naturally fishless lakes and have resulted in cascading food web repercussions in aquatic and terrestrial habitats. Additional anthropogenic influences that result from increases in global airborne emissions also threaten wildlife habitat. Atmospheric nitrogen deposition has been recognized as an anthropogenic contributor to acidification and eutrophication of wilderness ecosystems. Planktonic communities have shown declines in response to predation and shifts in composition as a result of nutrient inputs and acidification, both of …


Continuous Monitoring System Based On Systems' Environment, Eli Weintraub, Yuval Cohen May 2015

Continuous Monitoring System Based On Systems' Environment, Eli Weintraub, Yuval Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

We present a new framework (and its mechanisms) of a Continuous Monitoring System (CMS) having new improved capabilities, and discuss its requirements and implications. The CMS is based on the real-time actual configuration of the system and the environment rather than a theoretic or assumed configuration. Moreover, the CMS predicts organizational damages taking into account chains of impacts among systems' components generated by messaging among software components. In addition, the CMS takes into account all organizational effects of an attack. Its risk measurement takes into account the consequences of a threat, as defines in risk analysis standards. Loss prediction is …


Html5 Zero Configuration Covert Channels: Security Risks And Challenges, Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, Tahar Kechadi May 2015

Html5 Zero Configuration Covert Channels: Security Risks And Challenges, Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent months there has been an increase in the popularity and public awareness of secure, cloudless file transfer systems. The aim of these services is to facilitate the secure transfer of files in a peer-to-peer (P2P) fashion over the Internet without the need for centralized authentication or storage. These services can take the form of client installed applications or entirely web browser based interfaces. Due to the P2P nature, there is generally no limit to the file sizes involved or to the volume of data transmitted - and where these limitations do exist they will be purely reliant on …


Measuring Hacking Ability Using A Conceptual Expertise Task, Justin S. Giboney, Jeffrey G. Proudfoot, Sanjay Goel, Joseph S. Valacich May 2015

Measuring Hacking Ability Using A Conceptual Expertise Task, Justin S. Giboney, Jeffrey G. Proudfoot, Sanjay Goel, Joseph S. Valacich

Annual ADFSL Conference on Digital Forensics, Security and Law

Hackers pose a continuous and unrelenting threat to organizations. Industry and academic researchers alike can benefit from a greater understanding of how hackers engage in criminal behavior. A limiting factor of hacker research is the inability to verify that self-proclaimed hackers participating in research actually possess their purported knowledge and skills. This paper presents current work in developing and validating a conceptual-expertise based tool that can be used to discriminate between novice and expert hackers. The implications of this work are promising since behavioral information systems researchers operating in the information security space will directly benefit from the validation of …


Invited Paper - A Profile Of Prolonged, Persistent Ssh Attack On A Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard May 2015

Invited Paper - A Profile Of Prolonged, Persistent Ssh Attack On A Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper is an investigation focusing on activities detected by SSH honeypots that utilised kippo honeypot software. The honeypots were located across a variety of geographical locations and operational platforms. The honeynet has suffered prolonged, persistent and attack from a /24 network which appears to be of Chinese geographical origin. In addition to these attacks, other attackers have been successful in compromising real hosts in a wide range of other countries that were subsequently involved in attacking the honeypot machines in the honeynet.

Keywords: Cyber Security, SSH, Secure Shell, Honeypots, Kippo


Expectations For Methodology And Translation Of Animal Research: A Survey Of Health Care Workers, Ari Joffe, Meredith Bara, Natalie Anton, Nathan Nobis May 2015

Expectations For Methodology And Translation Of Animal Research: A Survey Of Health Care Workers, Ari Joffe, Meredith Bara, Natalie Anton, Nathan Nobis

Nathan M. Nobis, PhD

Background: Health care workers (HCW) often perform, promote, and advocate use of public funds for animal research (AR); therefore, an awareness of the empirical costs and benefits of animal research is an important issue for HCW. We aim to determine what health-care-workers consider should be acceptable standards of AR methodology and translation rate to humans. Methods: After development and validation, an e-mail survey was sent to all pediatricians and pediatric intensive care unit nurses and respiratory-therapists (RTs) affiliated with a Canadian University. We presented questions about demographics, methodology of AR, and expectations from AR. Responses of pediatricians and nurses/RTs were …


Inivited Paper - Potential Changes To Ediscovery Rules In Federal Court: A Discussion Of The Process, Substantive Changes And Their Applicability And Impact On Virginia Practice, Joseph J. Schwerha, Susan L. Mitchell, John W. Bagby May 2015

Inivited Paper - Potential Changes To Ediscovery Rules In Federal Court: A Discussion Of The Process, Substantive Changes And Their Applicability And Impact On Virginia Practice, Joseph J. Schwerha, Susan L. Mitchell, John W. Bagby

Annual ADFSL Conference on Digital Forensics, Security and Law

The Federal Rules of Civil Procedure (FRCP) are subject to a unique process also once used in revising the Federal Rules of Evidence (FRE). Today, this process is followed in revisions of the FRCP, the Federal Rules of Criminal Procedure and the Federal Bankruptcy Rules. This unique rulemaking process differs significantly from traditional notice and comment rulemaking required for a majority of federal regulatory agencies under the Administrative Procedure Act (APA).1 Most notably, rule-making for the federal courts’ procedural matters remain unaffected by the invalidation of legislative veto. It is still widely, but wrongly believed, that the legislative veto was …


On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis May 2015

On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis

Annual ADFSL Conference on Digital Forensics, Security and Law

While cybercrime proliferates – becoming more complex and surreptitious on the Internet – the tools and techniques used in performing digital investigations are still largely lagging behind, effectively slowing down law enforcement agencies at large. Real-time remote acquisition of digital evidence over the Internet is still an elusive ideal in the combat against cybercrime. In this paper we briefly describe the architecture of a comprehensive proactive digital investigation system that is termed as the Live Evidence Information Aggregator (LEIA). This system aims at collecting digital evidence from potentially any device in real time over the Internet. Particular focus is made …


Dimethylsulphoxide (Dmso) In Biological Samples: A Comparison Of The Ticl3 And Nabh4 Reduction Methods Using Headspace Analysis, E Deschaseaux, R Kiene, Graham Jones, Myrna Deseo, H Swan, L Oswald, Bradley Eyre May 2015

Dimethylsulphoxide (Dmso) In Biological Samples: A Comparison Of The Ticl3 And Nabh4 Reduction Methods Using Headspace Analysis, E Deschaseaux, R Kiene, Graham Jones, Myrna Deseo, H Swan, L Oswald, Bradley Eyre

Dr Myrna A Deseo

No abstract provided.


A Review Of Recent Case Law Related To Digital Forensics: The Current Issues, Kelly A. Cole, Shruti Gupta, Dheeraj Gurugubelli, Marcus K. Rogers May 2015

A Review Of Recent Case Law Related To Digital Forensics: The Current Issues, Kelly A. Cole, Shruti Gupta, Dheeraj Gurugubelli, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics is a new field without established models of investigation. This study uses thematic analysis to explore the different issues seen in the prosecution of digital forensic investigations. The study looks at 100 cases from different federal appellate courts to analyze the cause of the appeal. The issues are categorized into one of four categories, ‘search and seizure’, ‘data analysis’, ‘presentation’ and ‘legal issues’. The majority of the cases reviewed related to the search and seizure activity.

Keywords: Computer Investigation, Case Law, Digital Forensics, Legal Issues, and Courts


Collective Action: Why The Future Is Brighter For Undergraduate Teaching In The Mathematical Sciences, Karen Saxe May 2015

Collective Action: Why The Future Is Brighter For Undergraduate Teaching In The Mathematical Sciences, Karen Saxe

Karen Saxe

This posting appeared as a blog posting in the AMS Blog (http://blogs.ams.org/matheducation/2015/05/20/collective-action-why-the-future-is-brighter-for-undergraduate-teaching-in-the-mathematical-sciences/) and in the AWM (Association for Women in Mathematics) Newsletter, July/August 2015. The URL for the AWM Newsletter is https://sites.google.com/site/awmmath/awm/newsletter. A link to the blog posting is connected to this listing. In addition, a pdf copy of the blog posting is attached to this reference.


New Constraints On Quantum Gravity From X-Ray And Gamma-Ray Observations, Eric S. Perlman, Saul A. Rappaport, Wayne A. Christiansen, Yeejack Ng, John G. Devore, David A. Pooley May 2015

New Constraints On Quantum Gravity From X-Ray And Gamma-Ray Observations, Eric S. Perlman, Saul A. Rappaport, Wayne A. Christiansen, Yeejack Ng, John G. Devore, David A. Pooley

Aerospace, Physics, and Space Science Faculty Publications

One aspect of the quantum nature of spacetime is its “foaminess” at very small scales. Many models for spacetime foam are defined by the accumulation power α, which parameterizes the rate at which Planck-scale spatial uncertainties (and the phase shifts they produce) may accumulate over large path lengths. Here α is defined by the expression for the path-length fluctuations, dℓ, of a source at distance ℓ, wherein dℓ  ℓ1-aℓ a P , with ℓP being the Planck length. We reassess previous proposals to use astronomical observations of distant quasars and active galactic nuclei to test models of spacetime foam. …


Energy, Contact, And Density Profiles Of One-Dimensional Fermions In A Harmonic Trap Via Nonuniform-Lattice Monte Carlo Calculations, Casey E. Berger, E. R. Anderson, J. E. Drut May 2015

Energy, Contact, And Density Profiles Of One-Dimensional Fermions In A Harmonic Trap Via Nonuniform-Lattice Monte Carlo Calculations, Casey E. Berger, E. R. Anderson, J. E. Drut

Physics: Faculty Publications

We determine the ground-state energy and Tan's contact of attractively interacting few-fermion systems in a one-dimensional harmonic trap, for a range of couplings and particle numbers. Complementing those results, we show the corresponding density profiles. The calculations were performed with a lattice Monte Carlo approach based on a nonuniform discretization of space, defined via Gauss-Hermite quadrature points and weights. This particular coordinate basis is natural for systems in harmonic traps, and can be generalized to traps of other shapes. In all cases, it yields a position-dependent coupling and a corresponding nonuniform Hubbard-Stratonovich transformation. The resulting path integral is performed with …


Epitaxial Crn Thin Films With High Thermoelectric Figure Of Merit, Eric L. Thies, Daniel A. Hillsberry, Dmitri A. Tenne May 2015

Epitaxial Crn Thin Films With High Thermoelectric Figure Of Merit, Eric L. Thies, Daniel A. Hillsberry, Dmitri A. Tenne

Physics Faculty Publications and Presentations

A large enhancement of the thermoelectric figure of merit is reported in single crystalline films of CrN. The strong reduction of the lattice thermal conductivity in the rock-salt phase of this material is shown to be related to intrinsic lattice instabilities, which is similar to the resonant bonding effect proposed for cubic IV-VI compounds. These results demonstrate that useful ideas from classic thermoelectrics and phase change materials can be extended to transition metal nitrides and oxides.


Two Algorithms For Finding Edge Colorings In Regular Bipartite Multigraphs, Patricia T. Neckowicz May 2015

Two Algorithms For Finding Edge Colorings In Regular Bipartite Multigraphs, Patricia T. Neckowicz

Dartmouth College Undergraduate Theses

For a d-regular bipartite multigraph, an edge coloring is equivalent to a decomposition of the edge set into d perfect matchings. When d is a power of 2, we can recursively perform Euler partitions to find the perfect matchings. When d is not a power of 2, however, we eventually reach a subproblem graph of odd degree where we can no longer perform an Euler partition. We propose two different algorithms that address this case. Both algorithms make use of an auxiliary matching, called dummy edges, to make the degree of the graph even. In the first algorithm, dummy edges …


Measuring Strain In Trusses, Spencer Metzsch May 2015

Measuring Strain In Trusses, Spencer Metzsch

Senior Theses

Strain is an important quantity in engineering design and materials science that relates the deformation of a material to its original length, through a percentage. Different materials exhibit particular qualities under loading, for example the amount of strain due to a certain magnitude of force, or the amount of strain that can be borne before failure. This experiment aims to compare the relative strengths of three common truss configurations by measuring the strain in their members under loading. The Queen’s post truss was found to be the best at minimizing strain under similar loading conditions.


Abstracts Volume 1 2014 English May 2015

Abstracts Volume 1 2014 English

Journal of Ocean and Coastal Economics

Abstracts for Volume 1 2014 in English


A New Cyber Forensic Philosophy For Digital Watermarks In The Context Of Copyright Laws, Vinod P. Bhattathiripad, Sneha Sudhakaran, Roshna K. Thalayaniyil May 2015

A New Cyber Forensic Philosophy For Digital Watermarks In The Context Of Copyright Laws, Vinod P. Bhattathiripad, Sneha Sudhakaran, Roshna K. Thalayaniyil

Annual ADFSL Conference on Digital Forensics, Security and Law

The objective of this paper is to propose a new cyber forensic philosophy for watermark in the context of copyright laws for the benefit of the forensic community and the judiciary worldwide. The paper first briefly introduces various types of watermarks, and then situates watermarks in the context of the ideaexpression dichotomy and the copyright laws. It then explains the forensic importance of watermarks and proposes a forensic philosophy for them in the context of copyright laws. Finally, the paper stresses the vital need to incorporate watermarks in the forensic tests to establish software copyright infringement and also urges the …


A Survey Of Software-Based String Matching Algorithms For Forensic Analysis, Yi-Ching Liao May 2015

A Survey Of Software-Based String Matching Algorithms For Forensic Analysis, Yi-Ching Liao

Annual ADFSL Conference on Digital Forensics, Security and Law

Employing a fast string matching algorithm is essential for minimizing the overhead of extracting structured files from a raw disk image. In this paper, we summarize the concept, implementation, and main features of ten software-based string matching algorithms, and evaluate their applicability for forensic analysis. We provide comparisons between the selected software-based string matching algorithms from the perspective of forensic analysis by conducting their performance evaluation for file carving. According to the experimental results, the Shift-Or algorithm (R. Baeza-Yates & Gonnet, 1992) and the Karp-Rabin algorithm (Karp & Rabin, 1987) have the minimized search time for identifying the locations of …


Investigating Forensics Values Of Windows Jump Lists Data, Ahmad Ghafarian May 2015

Investigating Forensics Values Of Windows Jump Lists Data, Ahmad Ghafarian

Annual ADFSL Conference on Digital Forensics, Security and Law

Starting with Windows 7, Microsoft introduced a new feature to the Windows Operating Systems called Jump Lists. Jump Lists stores information about user activities on the host machine. These activities may include links to the recently visited web pages, applications executed, or files processed. Computer forensics investigators may find traces of misuse in Jump Lists auto saved files. In this research, we investigate the forensics values of Jump Lists data. Specifically, we use several tools to view Jump Lists data on a virtual machine. We show that each tool reveal certain types of information about user’s activity on the host …


Abstracts Volume 1 2014 Japanese, The Editors May 2015

Abstracts Volume 1 2014 Japanese, The Editors

Journal of Ocean and Coastal Economics

Abstracts to Volume 1 2014 Japanese


Abstracts Volume 1 2014 Korean, The Editors May 2015

Abstracts Volume 1 2014 Korean, The Editors

Journal of Ocean and Coastal Economics

Abstracts to Volume 1 2014 in Korean


Abstracts Volume 1 2014 French, The Editors May 2015

Abstracts Volume 1 2014 French, The Editors

Journal of Ocean and Coastal Economics

Abstracts to Volume 1 2014 in French


Abstracts Volume 1 2014 Portuguese, The Editors May 2015

Abstracts Volume 1 2014 Portuguese, The Editors

Journal of Ocean and Coastal Economics

Abstracts to Volume 2014 in Portuguese


An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice Fischer May 2015

An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice Fischer

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …


Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin May 2015

Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin

Annual ADFSL Conference on Digital Forensics, Security and Law

Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into modern malware which is rather hard to detect. None of the existing methods is able to efficiently detect a hypervisor in the face of countermeasures such as time cheating, temporary self-uninstalling, memory hiding etc. New hypervisor detection methods which will be described in this paper can detect a hypervisor under these countermeasures and even count several nested ones. These novel approaches rely on the …


Adaptive Pre-Specification In Randomized Trials With And Without Pair-Matching, Laura B. Balzer, Mark J. Van Der Laan, Maya L. Petersen May 2015

Adaptive Pre-Specification In Randomized Trials With And Without Pair-Matching, Laura B. Balzer, Mark J. Van Der Laan, Maya L. Petersen

Laura B. Balzer

In randomized trials, adjustment for measured covariates during the analysis can reduce variance and increase power. To avoid misleading inference, the analysis plan must be pre-specified. However, it is unclear a priori which baseline covariates (if any) should be included in the analysis. Consider, for example, the Sustainable East Africa Research in Community Health (SEARCH) trial for HIV prevention and treatment. There are 16 matched pairs of communities and many potential adjustment variables, including region, HIV prevalence, male circumcision coverage and measures of community-level viral load. In this paper, we propose a rigorous procedure to data-adaptively select the adjustment set …


U.S. Drought Monitor, May 19, 2015, Brad Rippey May 2015

U.S. Drought Monitor, May 19, 2015, Brad Rippey

United States Agricultural Commodities in Drought Archive

Drought map of U.S. for May 19, 2015 (5/19/15) plus: U.S. crop areas experiencing drought (map), Approximate percentage of crop located in drought, by state (bar graph), Percent of crop area located in drought, past 52 weeks (line graph) for: Corn, Soybeans, Hay, Cattle, Winter wheat.


Steps Towards A Nonlinear Cauchy-Characteristic Code Patching, Maria Babiuc-Hamilton May 2015

Steps Towards A Nonlinear Cauchy-Characteristic Code Patching, Maria Babiuc-Hamilton

Physics Faculty Research

Cauchy-characteristic extractions (CCE) avoids the errors due to extraction at finite worldtube. The Cauchy and the characteristic approaches have complementary strengths and weaknesses. Unification of the two methods is a promising way of combining the strengths of both formalisms.