3,123 research outputs found

    Energy Forensics Analysis

    Get PDF
    The energy consumed by a building can reveal information about the occupants and their activities inside the building. This could be utilized by industries and law enforcement agencies for commercial or legal purposes. Utility data from Smart Meter (SM) readings can reveal detailed information that could be mapped to foretell resident occupancy and type of appliance usage over desired time intervals. However, obtaining SM data in the United States is laborious and subjected to legal and procedural constraints. This research develops a user-driven simulation tool with realistic data options and assumptions of potential human behavior to determine energy usage patterns over time without any utility data. In this work, factors such as occupant number, the possibility of place being occupied, thermostat settings, building envelope, appliances used in households, appliance capacities, and the possibility of using each appliance, weather, and heating-cooling systems specifications are considered. For five specific benchmarked scenarios, the range of the random numbers is specified based on assumed potential human behavior for occupancy and energy-consuming appliances usage possibility, with respect to the time of the day, weekday, and weekends. The simulation is developed using the Visual Basic Application (VBA)® in Microsoft Excel®, based on the discrete-event Monte Carlo Simulation (MCS). This simulation generates energy usage patterns and electricity and natural gas costs over 30-minutes intervals for one year. The simulated energy usage and the cost are reflected in the sensitivity analysis by comparing factors such as occupancy, appliance type, and time of the week. This work is intended to facilitate the analysis of building occupants\u27 activities by various stakeholders, subject to all legal provisions that apply. It is not intended for the general public to pursue these activities because legal ramifications might be involved

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response

    Full text link
    In the dynamic landscape of digital forensics, the integration of Artificial Intelligence (AI) and Machine Learning (ML) stands as a transformative technology, poised to amplify the efficiency and precision of digital forensics investigations. However, the use of ML and AI in digital forensics is still in its nascent stages. As a result, this paper gives a thorough and in-depth analysis that goes beyond a simple survey and review. The goal is to look closely at how AI and ML techniques are used in digital forensics and incident response. This research explores cutting-edge research initiatives that cross domains such as data collection and recovery, the intricate reconstruction of cybercrime timelines, robust big data analysis, pattern recognition, safeguarding the chain of custody, and orchestrating responsive strategies to hacking incidents. This endeavour digs far beneath the surface to unearth the intricate ways AI-driven methodologies are shaping these crucial facets of digital forensics practice. While the promise of AI in digital forensics is evident, the challenges arising from increasing database sizes and evolving criminal tactics necessitate ongoing collaborative research and refinement within the digital forensics profession. This study examines the contributions, limitations, and gaps in the existing research, shedding light on the potential and limitations of AI and ML techniques. By exploring these different research areas, we highlight the critical need for strategic planning, continual research, and development to unlock AI's full potential in digital forensics and incident response. Ultimately, this paper underscores the significance of AI and ML integration in digital forensics, offering insights into their benefits, drawbacks, and broader implications for tackling modern cyber threats

    Improving Information Alignment and Distributed Coordination for Secure Information Supply Chains

    Get PDF
    Industries are constantly striving to incorporate the latest technology systems into their operations so that they can maintain a competitive edge in their respective markets. However, even when they are able to stay up to speed with technological advancement, there continues to be a gap between the workforce skill set and available technologies. Organizations may acquire advanced systems, yet end up spending extended periods of time in the implementation and deployment phases, resulting in lost resources and productivity. The primary focus of this research is on streamlining the implementation and integration of new information technology systems to avoid the dire consequences of the process being prolonged or inefficient. Specifically, the goal of this research is to mitigate business challenges in information sharing and availability for employees and managers interacting with business tools and each other. This was accomplished by first interviewing work professionals in order to identify gap parameters. Based on the interview findings, recommendations were made in order to enhance the usability of existing tools. At this point, the research setting was shifted from network operations to supply chain operations due to the restrictive nature of network operations. The research team succeeded in developing a user-centered methodology to implement and deploy new business systems to mitigate risk during integration of new systems as the transition is made from the classic way of performing tasks. While this methodology was studied in supply chain operations, it enabled the identification of a common trend of challenges in operations work settings, regardless of the business application. Hence the findings of this research can be extrapolated to any business setting, besides the ones actually studied by the team. In addition, this research ensures that operational teams are able to maximize their benefit out of the technology available, thus enabling them to keep up with the rapidly evolving world of technology while minimizing sacrifices in resources or productivity in the process

    Using the open source library Libnodave for monitoring tasks in the Smart Grid scenario

    Get PDF
    [Abstract] Monitoring in the future intelligent power grids, called Smart Grids, is a critical task for the proper operation and surveillance of the infrastructure. On the other hand, open source systems are being progressively applied in R&D activities. This paper presents the utilization of the open source library Libnodave to communicate a programmable logic controller with a monitoring system through a TCP/IP network. The obtained results prove the feasibility of the proposal to be applied in the Smart Grids scenario.Junta de Extremadura; IB1804
    • …
    corecore