About
99
Publications
31,067
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
477
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (99)
Insider threats are among the most costly and prevalent cybersecurity incidents. Modern organizations lack an effective way to detect and deter insider threat events. Traditional mitigation approaches focusing on recruitment processes and workplace behavior have proven insufficient. Current analytic detection tools do not map technical indicators t...
The environment in which cyber-physical systems (CPS)
operate can vary in complexity and experiences change
constantly. These systems work mostly autonomously, with-
out supervision, and with little or no maintenance. They
continuously interact with the environment and with other
systems. The expectation is for them to last for long periods,
someti...
The development of novel non-destructive methodologies for the verification of electronic components authenticity is imperative to reduce the economic and safety risks associated with the use of counterfeited products. Currently, inspection methods rely on a series of electrical and physical tests that usually are labor intensive, destructive, and...
Construction materials are, by the very nature of building something, an investment in the future. Every project highlights the possibilities of the building or structure, but when a catastrophic event renders it useless, the landfills grow, and the resources’ potential is lost. The end of a building does not need to mean the end of those materials...
This paper looks at current active shooter mitigation techniques employed by schools throughout the country in an attempt to mitigate casualties during an active shooter event. The researchers modified an existing Columbine High School agent-based model created by Jae Lee, MS, to examine if the introduction of a school resource officer (SRO), conce...
Each year theme parks can see up to 20 million patrons, but often little effort is put into planning for an emergency evacuation. In this study, we built a multiagent simulation model using AnyLogic® 8.5.1. The model was based on a preliminary design of a theme park provided by AOA Builds, Orlando. This research had two goals: the first was to comp...
In response to several mass-casualty shootings in the United States, multiple legislative bodies have promoted or adopted laws that restrict the magazine capacity of firearms. The stated intent of these laws is to reduce the number of rounds a bad actor can fire in a mass-casualty situation. However, objectors argue that the laws not only are ineff...
Gun violence in places of worship (POW) has long been an issue and has been addressed repeatedly in the literature. Contextually, most of the research has been pertinent to relatively large POW, situated in an urban setting. However, rural churches have not been addressed, and they appear to have a far less defensive posture, mainly because of thei...
Software libraries have been used for decades to produce code in a quick and cost-effective manner. The use of well-designed libraries permits software developers and other professionals to create applications due in part to code reusability. Also, good libraries grant lesser skilled developers the opportunity to make high-quality applications they...
We present our approach to several control challenges in high-speed autonomous racing for the Indy Autonomous Challenge (IAC). The IAC involves autonomous head-to-head racing at speeds approaching 200 mph. The autonomy system must maintain traction and stability when operating at such high speeds while also maneuvering aggressively around other com...
Lithium-ion batteries (LIBs) are being used in a variety of applications due to their desirable energy storage characteristics required for modern electronic devices. However, LIBs are prone to thermal runaway due to the flammable liquid electrolyte, decomposition of solid electrolyte interphase from anode surfaces, and melting of polypropylene (PP...
Objective:
Propose standardized communication formats and procedures at the point of distribution (POD) sites to facilitate the effective management and alleviate friction points that may occur while responding to a widespread medical incident within the National Incident Management System (NIMS).
Design:
Through observation of POD operations an...
Points of distribution, also known as points of dispensing (POD), are a means for public and private organizations to assist their communities in times of crisis. There are two principal categories of PODs, open and closed, but all PODs differ in design, properties, and application. This study investigates two POD variations: drive-through and supe...
Gun violence in places of worship has long been an issue and has been addressed repeatedly in the literature. Contextually most of the research has been pertinent to relatively large places of worship, situated in an urban setting. However, rural churches have not been addressed, and they appear to have a far less defensive posture, mainly because...
Objective: Propose standardized communication formats and procedures at the point of distribution (POD) sites to facilitate the effective management and alleviate friction points that may occur while responding to a widespread medical incident within the National Incident Management System (NIMS). Design: Through observation of POD operations and i...
Threats from drones are becoming an increasing security concern throughout the U.S. and worldwide. No current standards exist for the manufacture and operation of counter unmanned aerial system technology, making it difficult to determine effective systems and components for specific uses. Current policy within the U.S. makes unmanned aerial system...
Technological advances have led to the prevalence of small unmanned aerial systems (sUAS) which has proven to be a security concern for fixed facilities to include prisons, airports, and forward operating bases. This study explores if agent-based simulation modeling can serve as a useful tool for developing counter unmanned aerial system (C-UAS) pa...
As unmanned ground and aerial vehicles become more accessible and their usage covers a wider area of application, including for threatening purposes which can cause connected catastrophe, a surveillance system for the public places is being considered more essential to respond to those possible threats. We propose an inexpensive, lighter, safer, an...
Remote sensing technology and unmanned surface
vehicles (USVs) have great potential for spill coverage applications. However, there is still a lack of research on adequate
path planners for USVs based on remote sensing images. In
this study, we propose an image processing and model-based
path planner that can generate an efficient path for a USV to...
Water pollution has caused increased incidence of algal growth around the globe. Harmful algae blooms result in massive economic losses. In this paper, a multi-robot based task planner is designed to remove excessive algae from water bodies and to identify algae build-up so that prompt action can be taken against its accumulation. Computer vision i...
The 1999 Columbine High School shooting was a bold reminder which emphasized the
importance of active shooter preparedness for the first responder communities and the general public. Since Columbine, the preparedness for active shooter incidents (ASIs) both in the public and private sectors proactively took place. Currently, the RUN.HIDE.FIGHT. (RH...
The 2018 Stoneman Douglas High School (Parkland) shooting emphasized the importance of active shooter preparedness for both the first responder communities and the general public. Since the 1999 Columbine Massacre, the preparedness for active shooter incidents (ASIs) proactively took place. Currently, the Run.Hide.Fight. [2] (RHF) response for una...
A disconcerting ramification of water pollution caused by burgeoning populations, rapid industrialization and modernization of agriculture, has been the exponential increase in the incidence of algal growth across the globe. Harmful algal blooms (HABs) have devastated fisheries, contaminated drinking water and killed livestock, resulting in economi...
Objective:
The objective of this research was to develop a computer simulation model that will provide the most optimal allocation of resources for a point of distribution (POD) site.
Design:
A baseline assessment was conducted by participants establishing POD sections with no guidance from the investigator. A computer model was built with four...
The 1999 Colorado Columbine Massacre was an eye-opening incident that reassessed the first responders’ and the general public’s readiness for active shooter incidents (ASI). According to the Federal Bureau of Investigation, the rate of ASI and casualty counts raised from 6.4 incidents to 16.4 incidents per year from 2000 to 2013. The law enforcemen...
Electric vehicles (EVs) are a promising alternative to conventional vehicles. Several commercial EVs have already been in the market for a few years. However, greater adoption of EVs still faces several challenges. The concern about lifespan of EV batteries due to degradation is one of them. Lifespan information of populations of EV batteries is st...
Twenty five years' experience observing and developing disaster and crisis recovery plans within the electric utility industry provided the impetus and knowledge to develop a software-based single system strategic recovery algorithm for electric utilities utilizing systems engineering techniques. The threat of system failure resulting from solar fl...
This research paper was created to explore the possible optimizations a point of dispensing unit would require to be the most effective. Utilizing every resource effectively is very important when responding to disasters as well as attacks on the country. This optimization should help to better utilize volunteers as well as non-government organizat...
Over the past decade, the Advanced Persistent Threat (APT) has risen to forefront of
cybersecurity threats. APTs are a major contributor to the billions of dollars lost by
corporations around the world annually. The threat is significant enough that the Navy Cyber
Power 2020 plan identified them as a “must mitigate” threat in order to ensure the se...
Purpose
Transportation project evaluation and prioritization use traditional performance measures including travel time, safety, user costs, economic efficiency and environmental quality. The project impacts in terms of enhancing the infrastructure resilience or mitigating the consequences of infrastructure damage in the event of disaster occurrenc...
Active shooting violence poses a serious threat to public safety. The outcome is tragic due to the large number of casualties and injuries that can occur as well as the lasting emotional devastation it causes. This study examines the impact of active shooters in gun-free zones. Gun-free zones include all areas where the general public is forbidden...
A statistical modeling of fire spread is intended to enable to firelighters to make the best plan by expecting the fire spread and to effectively extinguish a fire in buildings. In this Fpaper, Anylogic simulation modeling of a statistical fire spread is introduced for fire accident correspondence in buildings. For the modeling, we apply statistica...
Active shooting violence poses a serious threat to public safety. The outcome is tragic due to the large number of casualties and injuries that can occur as well as the lasting emotional devastation it causes. This study examines the impact of active shooters in gun-free zones. Gun-free zones include all areas where the general public is forbidden...
In this paper, we present the modeling of a multirobot energy saving system (MRESS) to increase operating time of a firefighting robot. MRESS is intended to enable a firefighting robot with sub-robots and a fire hose to effectively reach desired destinations while saving battery. To increase operating time by improving the traction efficiency of th...
Description
Introduction of information technology into the practice of emergency management and homeland security emerge as the dawn of new applications but are these methods the doom for liberty and privacy. The abundance of disasters from all causes, have illuminated the fragility and weakness in our civilization, the urgency for taking action a...
Purpose
– This study aims to provide data on the optimal staff, materials, space and time resources required to operate a regional hub reception center, a “short-term facility with the goal to process and transport displaced survivors (evacuees) to temporary or permanent shelters following a catastrophic incident” (Bonabeau, 2002). The facility wil...
There is a recent trend among low speed electric vehicle manufacturers to update traction batteries from older, heavy chemistries to new, lighter battery chemistries. In this viability study, a Club Car Villager LSV electric golf cart was converted from the original flooded lead acid batteries to hard carbon/mixed oxide lithium batteries. The range...
Vehicles such as buses, delivery trucks, mining equipment, and motorsport vehicles often repeat a highly defined pattern, route, or track during normal use. For these vehicles, standard dynamometer drive cycles are of little use. In this paper it is proposed that deriving a vehicle drive cycle from empirical data collected from on-board vehicle sen...
Vehicles such as buses, delivery trucks, mining equipment, and motorsport vehicles often repeat a highly defined pattern, route, or track during normal use. For these vehicles, standard dynamometer drive cycles are of little use. In this paper it is proposed that deriving a vehicle drive cycle from empirical data collected from on-board vehicle sen...
There is a recent trend among low speed electric vehicle manufacturers to update traction batteries from older, heavy chemistries to new, lighter battery chemistries. In this viability study, a Club Car Villager LSV electric golf cart was converted from the original flooded lead acid batteries to hard carbon/mixed oxide lithium batteries. The range...
To ascertain whether analyses of social media trends for various Twitter responses following a major disaster produce implications for improving the focus on public health resources and messaging to disaster victims.
Radian6 and trend analyses were used to analyze 12-hour counts of Twitter data before, during, and after the March 2011 Japanese eart...
Background: The 2014 Ebola epidemic resulted in 28,635 cases and 11,314 deaths as of November 8th, 2015. With first responders deploying from the United States to assist with the many challenges being faced in the field, they encountered a new set of traumatic events and situations that undoubtedly put them at risk for developing a mental disorder....
The security of any transportation infrastructure can be defined as a combination of threat likelihood, infrastructure resilience, and consequence. In view of their inherently dynamic and highly unpredictable nature, threat likelihood and consequence data is difficult to determine with certainty. Due to this problem, this paper presents a new fuzzy...
Solar Photovoltaic (PV) systems have been used extensively for residential applications. There are also several programs that promote the installation of solar PV systems in the US, such as the California Solar Initiative (CSI) program which provides cash back for solar energy systems for existing homes. As a result, educators have an opportunity t...
Globally there has been a substantial push for renewable energy adoption. Some of the reasons for this drive include the need for carbon reduction in energy sources in the face of increasing atmospheric CO2 concentrations, energy security in light of political tensions in energy producing regions and increasingly difficult means of accessing fossil...
Commonly, disaster contingency calls for separation of location for redundant locations to maintain the needed redundancy. This document addresses issues for the data center redundancy, including limits to the distribution, distance and location that may impact on the efficiency or energy.
This study provides data on the optimal staff, materials, space, and time resources required to operate a regional hub reception center, a “short-term facility with the goal to process and transport displaced survivors (evacuees) to temporary or permanent shelters following a catastrophic incident,” (Regional Catastrophic Planning Team, 2012). The...
Transportation project prioritization uses performance measures that are related to the transportation asset, its operations, and its environment. However, in the state of practice, evaluation does not consider directly the likelihood of natural or man-made threats, the infrastructure resilience, or the consequences of the infrastructure damage in...
When developing response plans in the aftermath of a catastrophic incident, jurisdictions often fail to conduct the necessary interdisciplinary planning needed to fully address the needs across jurisdictional borders. The Purdue Homeland Security Institute (PHSI) was selected by the City of Chicago Office of Emergency Management and Communications...
Active shooting violence at confined settings, such as educational institutions, poses serious security concerns to public safety. In studying the effects of active shooter scenarios, the common denominator associated with all events, regardless of reason/intent for shooter motives, or type of weapons used, was the location chosen and time expended...
Humans will replace human labor with new robotics technologies, especially where humans can be placed in danger situations or task domains. Evolving sensor and robotic technologies allow the transfer of humans from mundane, dangerous or difficult tasks, leaving robots to apply their specific capabilities to replace human's daily routines or hazardo...
Advances in scientific research related to electric vehicles have led to generation of large amounts of data. This data is mainly logger data collected from various sensors in the vehicle and stored as flat files. It is predominantly unstructured and non-relational in nature, also called Big Data. Analysis of such data needs a high performance info...
With their superior advantages of high capacity and low percentage of self-discharge, lithium-ion batteries have become the most popular choice for power storage in electric vehicles. Due to the increased potential for long life of lithium-ion batteries in vehicle applications, manufacturers are pursuing methodologies to increase the reliability of...
Evidence of graphical user interface server operating system energy overhead is presented. It is posed that data centers would have substantial energy savings by eliminating graphical user interface operating systems.
Using the example of a major event, this case study shows how social media analytics can be used for real-time assessment and issue identification. We introduce a method of using social media analytics that enable both broad overall assessment and in-depth understanding of the topics and issues that emerge around a marketing campaign.
The city of Chicago, Illinois is making strides to become more prepared for large-scale disasters. One idea is called a Regional Hub Reception Center (RHRC), which converts an existing facility into a temporary shelter for evacuees in the event of a 10-kiloton nuclear blast being detonated in the center of downtown. The RHRC will provide the evacue...
Using social media analytics tools, Radian6 and Visible Technologies, Purdue Homeland Security Institute (PHSI) researchers were able to monitor, capture and analyze publicly posted online information pertaining to the Super Bowl XLVI. The study collected and analyzed data regarding the public's perceptions of the Super Bowl XLVI marketing campaign...
We discuss the proof of concept that gives mobile robotic units the ability to provide a mobile wireless mesh network providing wireless service to end-clients and also demonstrate the ability to increase the throughput of this mobile wireless mesh system by autonomously reducing the hop count required for network traffic to transit through. In doi...
This paper investigates the pertinent concepts centric to electric vehicle (EV) and hybrid electric vehicle (HEV) battery value. The factors that contribute to battery degradation, and thus devaluation, are examined. While a battery may no longer be useful in a vehicle, this does not mean the battery can no longer be used in other applications. Fou...
This paper investigates the concepts of state-of-charge and state of health. The technical challenges that each method faces are discussed, in addition to current research methodologies that are conducted in the academy and industry. A proposed strategy is presented to prepare consumers to the application of these construct in every-day use of elec...
GPS is a technology that allows for accurate tracking of various parameters, namely speed and location. These parameters are important to many applications, such as autonomous vehicles. In order to make a successful autonomous vehicle, it is necessary to be able to quantify its performance. Tracking a vehicle with GPS is an effective, well-establis...
Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise,...
Navigation applications have a large development base in robotics, gaming, asset tracking, networking, and more. The principle of a navigation system encompasses a number of areas (e.g. localization, path-planning, map generation, etc). This project presents a multi-agent path-planning simulation and the communication protocols designed for the age...
Researchers have developed elastic light scatter (ELS) technique by using globally networked libraries of unique scattering patterns produced by bacterial colonies, an efficient method of identifying pathogens that has potential applications in food and water safety, health care, and biodefense. ELS works by encoding the micro- and macro-structural...