Search
Now showing items 21-30 of 34
Network-based optimization techniques for wind farm location decisions
(Frontiers of Engineering Management, 2018-11-29)
This study aims to find appropriate locations for wind farms that can maximize the overall energy output while controlling the effects of wind speed variability. High wind speeds are required to obtain the maximum possible ...
False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis
(IEEE, 2018-12-23)
In this paper, we propose a class of false analog data injection attack that can misguide the system as if topology errors had occurred. By utilizing the measurement redundancy with respect to the state variables, the ...
Causes and Policy Recommendations for Low Contraceptive use in Pakistan
(Humanities and Social Sciences Review, 2017-01)
According to Pakistan Demographic and Health Survey (2012-13), Pakistan is the sixth most populous country in the world with existing level of unmet demand for family planning services being as high as 20%; however, the ...
Estimating the Economic Costs of Espionage
(2010)
Economic espionage is a serious threat to the vitality of the U.S. economy. While this is a widely accepted fact, there is no formal way to measure the damage an incident of economic espionage has on the U.S. economy. The ...
Youth Employment in Ghana: Conditions and Determinants
(2015-06-11)
Youth employment, and its limitations, is a pertinent problem that most developing nations face. “Youth Employment in Ghana: Conditions and Determinants” is a student-led research project that summarizes and analyzes the ...
Evaluating the Implementation of the National Strategy for Biosurveillance
(2015-05-20)
Biological incidents, both man-made and naturally occurring, represent a significant threat to the national security of the United States. Identifying these crises begins with the detection and reporting of essential ...
Pipeline Politics: Natural Gas in Eurasia
(2010)
Eurasia is a major source of oil and natural gas, and events in the region have a great potential to destabilize global security patterns. Supplies of natural gas and oil from Eurasia are vital for the functioning of ...
The 25th Anniversary of the Liberation of Kuwait: A Look at the History, Evolution, and Future of the US-Kuwaiti Relationship
(2017-03-06)
On August 2, 1990, Saddam Hussein invaded Kuwait. The subsequent liberation by a US-led coalition served as a watershed moment in US-Kuwaiti relations. The Gulf War is often viewed as the onset of the close relationship ...
Critical Infrastructure and Cyber Security
(2011)
We were tasked by CENTRA Technology, Inc., to create a methodology that could be used to prioritize critical cyber assets in the United States. We have answered that call by developing a user-friendly, consequence-based ...