Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 147301 - 147330 of 302639

Full-Text Articles in Physical Sciences and Mathematics

Rules Of Professional Responsibility In Digital Forensics: A Comparative Analysis, Filipo Sharevski Jan 2015

Rules Of Professional Responsibility In Digital Forensics: A Comparative Analysis, Filipo Sharevski

Journal of Digital Forensics, Security and Law

The consolidation of the rules of professional responsibility as recommended by the Committee on Identifying the Needs of Forensic Sciences Community (2009) accents the establishment of an uniform code of ethics emphasizing the importance of enforceability in strengthening the role the forensic science plays within the criminal justice system. Equally pertinent for the domain of digital forensics, this imperative entails a research commitment in comparing and contrasting the respective codes of ethics to illustrate their “variety, specificity and enforceability” in order to inform the discussion on the regulative aspects of the digital forensic discipline. Accordingly, this paper reviews the professional …


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Table Of Contents Jan 2015

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Computer Forensic Projects For Accountants, Grover S. Kearns Jan 2015

Computer Forensic Projects For Accountants, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …


Identification And Exploitation Of Inadvertent Spectral Artifacts In Digital Audio, N. C. Donnangelo, W. S. Kuklinski, R. Szabo, R. A. Coury, G. R. Hamshar Jan 2015

Identification And Exploitation Of Inadvertent Spectral Artifacts In Digital Audio, N. C. Donnangelo, W. S. Kuklinski, R. Szabo, R. A. Coury, G. R. Hamshar

Journal of Digital Forensics, Security and Law

We show that modulation products from local oscillators in a variety of commercial camcorders are coupled into the recorded audio track, creating narrow band time invariant spectral features. These spectral features, left largely intact by transcoding, compression and other forms of audiovisual post processing, can encode characteristics of specific camcorders used to capture the audio files, including the make and model. Using data sets both downloaded from YouTube and collected under controlled laboratory conditions we demonstrate an average probability of detection (Pd) approaching 0.95 for identification of a specific camcorder in a population of thousands of similar recordings, with a …


Table Of Contents Jan 2015

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Factors Influencing Digital Forensic Investigations: Empirical Evaluation Of 12 Years Of Dubai Police Cases, Ibtesam Alawadhi, Janet C. Read, Andrew Marrington, Virginia N. L. Franqueira Jan 2015

Factors Influencing Digital Forensic Investigations: Empirical Evaluation Of 12 Years Of Dubai Police Cases, Ibtesam Alawadhi, Janet C. Read, Andrew Marrington, Virginia N. L. Franqueira

Journal of Digital Forensics, Security and Law

In Digital Forensics, the number of person-hours spent on investigation is a key factor which needs to be kept to a minimum whilst also paying close attention to the authenticity of the evidence. The literature describes challenges behind increasing person-hours and identifies several factors which contribute to this phenomenon. This paper reviews these factors and demonstrates that they do not wholly account for increases in investigation time. Using real case records from the Dubai Police, an extensive study explains the contribution of other factors to the increase in person-hours. We conclude this work by emphasizing on several factors affecting the …


Tracking And Taxonomy Of Cyberlocker Link Sharers Based On Behavior Analysis, Xiao-Xi Fan, Kam-Pui Chow Jan 2015

Tracking And Taxonomy Of Cyberlocker Link Sharers Based On Behavior Analysis, Xiao-Xi Fan, Kam-Pui Chow

Journal of Digital Forensics, Security and Law

The growing popularity of cyberlocker service has led to significant impact on the Internet that it is considered as one of the biggest contributors to the global Internet traffic estimated to be illegally traded content. Due to the anonymity property of cyberlocker, it is difficult for investigators to track user identity directly on cyberlocker site. In order to find the potential relationships between cyberlocker users, we propose a framework to collect cyberlocker related data from public forums where cyberlocker users usually distribute cyberlocker links for others to download and identity information can be gathered easily. Different kinds of sharing behaviors …


Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova Jan 2015

Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova

Journal of Digital Forensics, Security and Law

With ubiquitous computing and the growth of the Internet of Things, there is vast expansion in the deployment and use of event data recording systems in a variety of environments. From the ships’ logs of antiquity through the evolution of personal devices for recording personal and environmental activities, these devices offer rich forensic and evidentiary opportunities that smash against rights of privacy and personality. The technical configurations of these devices provide for greater scope of sensing, interconnection options for local, near, and cloud storage of data, and the possibility of powerful analytics. This creates the unique situation of near-total data …


Plc Forensics Based On Control Program Logic Change Detection, Ken Yau, Kam-Pui Chow Jan 2015

Plc Forensics Based On Control Program Logic Change Detection, Ken Yau, Kam-Pui Chow

Journal of Digital Forensics, Security and Law

Supervisory Control and Data Acquisition (SCADA) system is an industrial control automated system. It is built with multiple Programmable Logic Controllers (PLCs). PLC is a special form of microprocessor-based controller with proprietary operating system. Due to the unique architecture of PLC, traditional digital forensic tools are difficult to be applied. In this paper, we propose a program called Control Program Logic Change Detector (CPLCD), it works with a set of Detection Rules (DRs) to detect and record undesired incidents on interfering normal operations of PLC. In order to prove the feasibility of our solution, we set up two experiments for …


Forensic Acquisition Of Imvu: A Case Study, Robert Van Voorst, M-Tahar Kechadi, Nhien-An Le-Khac Jan 2015

Forensic Acquisition Of Imvu: A Case Study, Robert Van Voorst, M-Tahar Kechadi, Nhien-An Le-Khac

Journal of Digital Forensics, Security and Law

There are many applications available for personal computers and mobile devices that facilitate users in meeting potential partners. There is, however, a risk associated with the level of anonymity on using instant message applications, because there exists the potential for predators to attract and lure vulnerable users. Today Instant Messaging within a Virtual Universe (IMVU) combines custom avatars, chat or instant message (IM), community, content creation, commerce, and anonymity. IMVU is also being exploited by criminals to commit a wide variety of offenses. However, there are very few researches on digital forensic acquisition of IMVU applications. In this paper, we …


Exploring The Use Of Plc Debugging Tools For Digital Forensic Investigations On Scada Systems, Tina Wu, Jason R.C. Nurse Jan 2015

Exploring The Use Of Plc Debugging Tools For Digital Forensic Investigations On Scada Systems, Tina Wu, Jason R.C. Nurse

Journal of Digital Forensics, Security and Law

The Stuxnet malware attack has provided strong evidence for the development of a forensic capability to aid in thorough post-incident investigations. Current live forensic tools are typically used to acquire and examine memory from computers running either Windows or Unix. This makes them incompatible with embedded devices found on SCADA systems that have their own bespoke operating system. Currently, only a limited number of forensics tools have been developed for SCADA systems, with no development of tools to acquire the program code from PLCs. In this paper, we explore this problem with two main hypotheses in mind. Our first hypothesis …


The Use Of Ontologies In Forensic Analysis Of Smartphone Content, Mohammed Alzaabi, Thomas A. Martin, Kamal Taha, Andy Jones Jan 2015

The Use Of Ontologies In Forensic Analysis Of Smartphone Content, Mohammed Alzaabi, Thomas A. Martin, Kamal Taha, Andy Jones

Journal of Digital Forensics, Security and Law

Digital forensics investigators face a constant challenge in keeping track with evolving technologies such as smartphones. Analyzing the contents of these devices to infer useful information is becoming more time consuming as the volume and complexity of data are increasing. Typically, such analysis is undertaken by a human, which makes it dependent on the experience of the investigator. To overcome such impediments, an automated technique can be utilized in order to aid the investigator to quickly and eciently analyze the data.In this paper, we propose F-DOS; a set of ontologies that models the smartphone content for the purpose of forensic …


Project Maelstrom: Forensic Analysis Of The Bittorrent-Powered Browser, Jason Farina, M-Tahar Kechadi, Mark Scanlon Jan 2015

Project Maelstrom: Forensic Analysis Of The Bittorrent-Powered Browser, Jason Farina, M-Tahar Kechadi, Mark Scanlon

Journal of Digital Forensics, Security and Law

In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website;s source code and multimedia content with new visitors. As a result, a Maelstrom hosted website cannot be taken offline by law enforcement or any other parties. Due to this open distribution model, a number of interesting censorship, security and privacy considerations are raised. This paper explores …


The Module Isomorphism Problem Reconsidered, Peter A. Brooksbank Jan 2015

The Module Isomorphism Problem Reconsidered, Peter A. Brooksbank

Faculty Journal Articles

Algorithms to decide isomorphism of modules have been honed continually over the last 30 years, and their range of applicability has been extended to include modules over a wide range of rings. Highly efficient computer implementations of these algorithms form the bedrock of systems such as GAP and MAGMA, at least in regard to computations with groups and algebras. By contrast, the fundamental problem of testing for isomorphism between other types of algebraic structures -- such as groups, and almost any type of algebra -- seems today as intractable as ever. What explains the vastly different complexity status of the …


Bayesian Function-On-Function Regression For Multilevel Functional Data, Mark J. Meyer, Brent A. Coull, Francesco Versace, Paul Cinciripini, Jeffrey S. Morris Jan 2015

Bayesian Function-On-Function Regression For Multilevel Functional Data, Mark J. Meyer, Brent A. Coull, Francesco Versace, Paul Cinciripini, Jeffrey S. Morris

Faculty Journal Articles

Medical and public health research increasingly involves the collection of complex and high dimensional data. In particular, functional data—where the unit of observation is a curve or set of curves that are finely sampled over a grid—is frequently obtained. Moreover, researchers often sample multiple curves per person resulting in repeated functional measures. A common question is how to analyze the relationship between two functional variables. We propose a general function-on-function regression model for repeatedly sampled functional data on a fine grid, presenting a simple model as well as a more extensive mixed model framework, and introducing various functional Bayesian inferential …


An Investigation Of Alkaline Earth And Rare Earth Elements In Human Bone Following Long-Term Parenteral Nutrition, Aubrey L. Galusha Jan 2015

An Investigation Of Alkaline Earth And Rare Earth Elements In Human Bone Following Long-Term Parenteral Nutrition, Aubrey L. Galusha

Legacy Theses & Dissertations (2009 - 2024)

This investigation focused on a unique collection of archived human bones obtained post-mortem from 7 patients, who had received long-term parenteral nutrition (PN) for up to 21 years. Parenterals are administered intravenously as a nutritional supplement, and may be contaminated with metals, which are completely absorbed into the blood compartment. Some metal contaminants may be deposited in the body’s reservoir for inorganic elements – bone.


Structure And Stability Of Amyloid Fibrils Studied By Advanced Vibrational Spectroscopy, Marudachalam Shanmugasundaram Jan 2015

Structure And Stability Of Amyloid Fibrils Studied By Advanced Vibrational Spectroscopy, Marudachalam Shanmugasundaram

Legacy Theses & Dissertations (2009 - 2024)

Protein misfolding often leads to the formation of refractory protein aggregates like amyloid fibrils. These fibrils possess a highly ordered structure and are implicated in over 25 severe diseases including Alzheimer’s, Parkinson’s and prion diseases. This work was focused on understanding the morphology and conformation of amyloid fibrils and their stability after formation. The deconstruction of fibrils as well as other aggregates like inclusion bodies under mild conditions was also investigated using Archaeal chaperones.


Water, Bison, And Horses: Natural Resources And Their Impacts On Native Raids And Relations In Late, Spanish Colonial New Mexico, Dori L. Gorczyca Jan 2015

Water, Bison, And Horses: Natural Resources And Their Impacts On Native Raids And Relations In Late, Spanish Colonial New Mexico, Dori L. Gorczyca

The Gettysburg Historical Journal

During the Spanish colonial period in New Mexico’s history, the area became a place where cultural, social, and economic mixing of various Native American groups and Spanish settlers frequently occurred. Certain peoples, such as the Pueblo, lived in an agrarian society and worked in close proximity to the Spanish. Other peoples, such as the Comanche, Apache, and Navajo, developed hostile relationships with these foreigners, and their raids on the Spanish, Pueblo, and each other changed the dynamic of their settlements. Sources from Spanish and Church officials, along with travel logs, discuss the effects of natural resources, such as water and …


Collaborative Knowledge As A Service Applied To The Disaster Management Domain, Katarina Grolinger, Emna Mezghani, Miriam Am Capretz, Ernesto Exposito Jan 2015

Collaborative Knowledge As A Service Applied To The Disaster Management Domain, Katarina Grolinger, Emna Mezghani, Miriam Am Capretz, Ernesto Exposito

Electrical and Computer Engineering Publications

Cloud computing offers services which promise to meet continuously increasing computing demands by using a large number of networked resources. However, data heterogeneity remains a major hurdle for data interoperability and data integration. In this context, a Knowledge as a Service (KaaS) approach has been proposed with the aim of generating knowledge from heterogeneous data and making it available as a service. In this paper, a Collaborative Knowledge as a Service (CKaaS) architecture is proposed, with the objective of satisfying consumer knowledge needs by integrating disparate cloud knowledge through collaboration among distributed KaaS entities. The NIST cloud computing reference architecture …


Energy Cost Forecasting For Event Venues, Katarina Grolinger, Andrea Zagar, Miriam Am Capretz, Luke Seewald Jan 2015

Energy Cost Forecasting For Event Venues, Katarina Grolinger, Andrea Zagar, Miriam Am Capretz, Luke Seewald

Electrical and Computer Engineering Publications

Electricity price, consumption, and demand forecasting has been a topic of research interest for a long time. The proliferation of smart meters has created new opportunities in energy prediction. This paper investigates energy cost forecasting in the context of entertainment event-organizing venues, which poses significant difficulty due to fluctuations in energy demand and wholesale electricity prices. The objective is to predict the overall cost of energy consumed during an entertainment event. Predictions are carried out separately for each event category and feature selection is used to select the most effective combination of event attributes for each category. Three machine learning …


Cavity Ignition In Supersonic Flow By Spark Discharge And Pulse Detonation, Timothy M. Ombrello, Campbell D. Carter, Chung-Jen Tam, Kuang-Yu Hsu Jan 2015

Cavity Ignition In Supersonic Flow By Spark Discharge And Pulse Detonation, Timothy M. Ombrello, Campbell D. Carter, Chung-Jen Tam, Kuang-Yu Hsu

United States Air Force: Publications

Ignition of an ethylene fueled cavity in a supersonic flow was achieved through the application of two energy deposition techniques: a spark discharge and pulse detonator (PD). High-frequency shadowgraph and chemiluminescence imaging showed that the spark discharge ignition was passive with the ignition kernel and ensuing flame propagation following the cavity flowfield. The PD produced a high-pressure and temperature exhaust that allowed for ignition at lower tunnel temperatures and pressures than the spark discharge, but also caused significant disruption to the cavity flowfield dynamics. Under certain cavity fueling conditions a multiple regime ignition process occurred with the PD that led …


Long-Lifetime Reverse Saturable Absorption In A Bipyridyl Platinum(Ii) Complex Bearing Naphthalimidylethynyl-Substituted Fluorenylacetylide Ligands, Timothy M. Pritchett, Michael J. Ferry, Andrew G. Mott, William Shensky Iii, Joy E. Haley, Rui Hui, Wenfang Sun Jan 2015

Long-Lifetime Reverse Saturable Absorption In A Bipyridyl Platinum(Ii) Complex Bearing Naphthalimidylethynyl-Substituted Fluorenylacetylide Ligands, Timothy M. Pritchett, Michael J. Ferry, Andrew G. Mott, William Shensky Iii, Joy E. Haley, Rui Hui, Wenfang Sun

United States Air Force: Publications

By fitting femtosecond transient difference absorption time series at multiple wavelengths, the singlet excited-state lifetime of a particular platinum(II) 2,2’-bipyridyl complex bearing naphthalimidylethynyl- substituted fluorenyl-acetylide ligands was determined to be 83.5 ± 39 ps in toluene solution. A triplet quantum yield of 0.06 was measured using relative actinometry. Excited-state absorption cross sections of 5.6 X 10-17 cm2 (singlet) and 7.8 X 10-16 cm2 (triplet) at 532 nm were obtained by using a five-level dynamic model to fit open-aperture Z scans at picosecond and nanosecond pulse widths and a variety of pulse energies. Most significantly, …


A Middleware Framework For Application-Aware And User-Specific Energy Optimization In Smart Mobile Devices, Sudeep Pasricha, Brad K. Donohoo, Chris Ohlsen Jan 2015

A Middleware Framework For Application-Aware And User-Specific Energy Optimization In Smart Mobile Devices, Sudeep Pasricha, Brad K. Donohoo, Chris Ohlsen

United States Air Force: Publications

munication, and social interaction. In addition to the demand for an acceptable level of performance and a comprehensive set of features, users often desire extended battery lifetime. In fact, limited battery lifetime is one of the biggest obstacles facing the current utility and future growth of increasingly sophisticated ‘‘smart’’ mobile devices. This paper proposes a novel application-aware and user-interaction aware energy optimization middleware framework (AURA) for pervasive mobile devices. AURA optimizes CPU and screen backlight energy consumption while maintaining a minimum acceptable level of performance. The proposed framework employs a novel Bayesian application classifier and management strategies based on Markov …


Unhindered Triangulene Salt Pairs: Substitution-Dependent Contact Ion Pairing And Complex Solvent-Separated Discotic Ions In Solution, Subrahmanyam Modekrutti Jan 2015

Unhindered Triangulene Salt Pairs: Substitution-Dependent Contact Ion Pairing And Complex Solvent-Separated Discotic Ions In Solution, Subrahmanyam Modekrutti

Theses and Dissertations--Chemistry

This work sought to enforce aromatic interactions between compatible π-molecular orbital systems with ionic bonding. In this case the interacting partners are oppositely charged discotic triangulene derivatives. The observed properties of the heterodimeric ion-pairs likely arise due to a hypothetical synergy between electrostatics and π-interactions. The work presented here describes investigation of putative covalency arising from this hypothetical synergy in the electrostatics driven π-stacking. In order to probe this, various hypotheses were made and experiments were designed to test their validity. The results from the experiments show existence of contact ion-pairs and complex solvent-separated discotic ions in solution. The formation …


Selective Tripodal Titanium Silsesquioxane Catalysts For The Epoxidation Of Unactivated Olefins, Sarah M. Peak Jan 2015

Selective Tripodal Titanium Silsesquioxane Catalysts For The Epoxidation Of Unactivated Olefins, Sarah M. Peak

Theses and Dissertations--Chemistry

Regiomeric mixture of HMe2Si(CH2)3(i-Bu)6Si7O9(OH)3 (6), containing a Si-H group in one of the ligands of the silsesquioxane, was tethered onto a vinyl terminated hyperbranched poly(siloxysilane) polymer via a hydrosilation reaction to generate extremely active catalysts, P1-8 and c-P1-8. The synthesis of 6, in good yield, was accomplished via hydrosilation of CH2=CHCH2(i-Bu)7Si8O12 (1) to generate ClMe2Si(CH2)3(i-Bu)7Si8O12 …


Iowa Academy Of Science: The New Bulletin, V11n1, Winter 2015, Iowa Academy Of Science Jan 2015

Iowa Academy Of Science: The New Bulletin, V11n1, Winter 2015, Iowa Academy Of Science

New Bulletin

Table of Contents

Executive Director Message --- 1
Annual Meeting --- 2, 3
Candidate Profiles --- 4, 5, 6
Donations --- 7
Institutional and Corporate Members --- 8


Evolution Of Cooperation In Mobile Populations, David Suarez, Praveen Suthaharan, Jonathan Rowell, Jan Rychtar Jan 2015

Evolution Of Cooperation In Mobile Populations, David Suarez, Praveen Suthaharan, Jonathan Rowell, Jan Rychtar

Spora: A Journal of Biomathematics

We consider a finite, fixed-size population of mobile cooperators and free-riders. A cooperator is an individual who, at a cost to itself, provides benefits to any and all individuals in its vicinity, whereas a free-rider does not provide any benefits and thus pays no cost. Individuals are free to move to maximize their payoff, and our model allows for the interactions among multiple individuals at the same time. Using Gillespie's algorithm, we build an exact stochastic simulation of this continuous-time Markov process and find that decreasing the individuals' mobility or decreasing the size of the interaction neighborhood promotes the fixation …


Multistrain Infections In Metapopulations, Sydney Garmer, Rachel Lynn, Dan Rossi, Alex Capaldi Jan 2015

Multistrain Infections In Metapopulations, Sydney Garmer, Rachel Lynn, Dan Rossi, Alex Capaldi

Spora: A Journal of Biomathematics

Viruses and bacteria responsible for infectious diseases often mutate and are carried between geographical regions. We consider a mathematical model which begins to account for these factors. We assume two disjoint populations that only occasionally co-mingle, and two strains of a disease present in these populations. Of interest are the equations describing the dynamics of this system, the conditions under which epidemics will occur, and the long term behavior of the system under various initial conditions. We find general conditions under which a state of disease-free equilibrium is stable. Additionally, we find existence of a biologically relevant equilibrium where two …


A Generalized Class Of Kumaraswamy Lindley Distribution With Applications To Lifetime Data, Broderick O. Oluyede, Tiantian Yang, Bernard Omolo Jan 2015

A Generalized Class Of Kumaraswamy Lindley Distribution With Applications To Lifetime Data, Broderick O. Oluyede, Tiantian Yang, Bernard Omolo

Department of Mathematical Sciences Faculty Publications

In this paper, we propose a new class of generalized distributions called the Exponentiated Kumaraswamy Lindley (EKL) distribution, as well as related sub-distributions. This class of distributions contains the Kumaraswamy Lindley (KL), generalized Lindley (GL), and Lindley (L) distributions as special cases. A series expansion of the density is obtained. Statistical properties of this class of distributions, including the hazard and reverse hazard functions, monotonicity property, shapes, moments, reliability, quantile function, mean deviations, Bonferroni and Lorenz curves, entropy and Fisher information are derived among others. The method of maximum likelihood is adopted for estimating the model parameters. Two applications to …