Lindsay Hopper
Western Kentucky University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Lindsay Hopper.
ieee international conference on technologies for homeland security | 2008
Lindsay Hopper; Phillip C. Womble; Ryan Moore; Jon Paschal; F.A. Payne; Chris Thompson; William Crist; Brian Luck; Nasrin Tabayehnejab; Tim Stombaugh; Suraj M. Alexander
The department of homeland security and the department of health and human services have targeted bulk food contamination as a focus for attention. Milk transport falls into three of the 17 targeted national infrastructure protection plan sectors including agriculture-food, public health and commercial facilities. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Our group has developed a milk transport security system which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations, and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally.
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VII | 2008
Phillip C. Womble; Lindsay Hopper; Chris Thompson; Suraj M. Alexander; William Crist; F.A. Payne; Tim Stombaugh; Jon Paschal; Ryan Moore; Brian Luck; Nasrin Tabayehnejab
The department of homeland security and the department of health and human services have targeted bulk food contamination as a focus for attention. Milk transport falls into three of the 17 targeted national infrastructure protection plan sectors including agriculture-food, public health and commercial facilities. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Our group has developed a milk transport security system which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations, and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally.
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV | 2005
Phillip C. Womble; Alexander Barzilov; Jon Paschal; Lindsay Hopper; Abe Music; Timothy Morgan; Ryan Moore; Dudley Pinson; Frederick J. Schultz; Michael J. Maston; Robert Kowalik
Northwest Nuclear, LLC (NWN), the Applied Physics Institute (API) at Western Kentucky University, and Crisis Prep Services, LLC (CPS) have developed a tracking technology for first responders and security personnel based upon the AeroScout system (a product of AeroScout, Inc.) and technologies developed independently by NWN, API, and CPS. These systems provide location information using 802.11XXX architecture by measuring the time of arrival of packets from a set of active radio frequency (RF) tags to a set of location receivers. The system can track and graphically display the location on maps, drawings, floor plans or photographs of tagged items on any 802.11-compliant devices (PDAs, laptops, computers, WiFi telephones) situated both outside and inside structures. This location information would be vital for tracking the location of first responders, security, and other emergency personnel during rescue operations; particularly, under adverse conditions (e.g., fires). NWN, API, and CPS have been improving the precision of the location measurement to an uncertainty of 20 cm or 8 inches (under certain conditions) and also developing algorithms to increase the accuracy. NWN and API personnel have developed: 1) special tags which indicate tampering or sudden movement and transmit briefly under these conditions, and 2) permanent and portable systems which can be deployed rapidly. Additional software created by Crisis Prep Services, LLC allows response force personnel to be tracked and located inside a building in real time as well as use the software and tags as a training and rehersal system. The location of each person is depicted on a drawing of the building and is displayed on a laptop computer or any other browser capable device.
ieee international conference on technologies for homeland security | 2009
Lindsay Hopper; Ronald Lynn Hopper; Phillip C. Womble
The Cyber Defense Laboratory at Western Kentucky University has established a multidisciplinary research team in order to gain a better understanding of the motives and methods of hackers. This involves the collaboration of computer scientists, network analysts, sociologists, and anthropologists. Most research along these lines to date has been performed by technical experts and has failed to consider social research and methods. On the other hand, social theorists tend to group network attacks with other forms of terrorism. We believe that network intrusions are sufficiently different from other forms of terrorism to warrant their own study. This research is innovative in both the way it defines network attacks as well as in the fusion of data from diverse fields of research. By bringing the strengths of social and technical research together, a clearer picture of hackers will emerge. This has implications for government and law enforcement as well as network security. A literature review of related research in the social sciences has been completed. Social scientists with experience in the identified sub-fields were brought onto the team and their results will then be integrated into the Cyber Defense Labs network security testbed. Using proven social research methods, team members will gain an understanding of the motives of hackers, the methods of attack, communication of ideas, learning resources and strategies, and any other aspects that may be revealed. This paper will discuss the results to date of this ongoing project.
APPLICATION OF ACCELERATORS IN RESEARCH AND INDUSTRY: Twentieth International#N#Conference | 2009
Alexander Barzilov; Ivan Novikov; Phillip C. Womble; Lindsay Hopper
Technique of rapid evaluation of a pulse neutron sources such as neutron generators under field conditions has been developed. The phoswich sensor and pulse‐shape discrimination techniques have been used for the simultaneous measurements of fast neutrons, thermal neutrons, and photons. The sensor has been calibrated using activation neutron detectors and a pulse deuterium‐tritium fusion neutron source.
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VII | 2008
Chris Davenport; James Lodmell; Phillip C. Womble; Alexander Barzilov; Jon Paschal; Robert Hernandez; Kyle T. Moss; Lindsay Hopper
Improvised explosive devices (IEDs) are an important concern to coalition forces during the conflicts in the Middle East. These devices are responsible for many casualties to American armed forces in the Middle East. These explosives are particularly dangerous because they are improvised with materials readily available to the designer, and there is no systematic way of explosive ordinance disposal. IEDs can be made from things such as standard military ammunition and can be detonated with common electronic devices such as cell phones and garage door openers. There is a great need for a low cost solution to neutralize these IEDs. At the Applied Physics Institute we are building a single function disrupter robot whose sole purpose is to neutralize these IEDs. We are modifying a toy remote control car to control it either wirelessly using WI-FI (IEEE 802.11) or wired by tethering the vehicle with an Ethernet cable (IEEE 802.3). The robot will be equipped with a high velocity fuze disrupter to neutralize the IED as well as a video camera for inspection and aiming purposes. This robot utilizes commercial-off-the-shelf (COTS) components which keeps the cost relatively low. Currently, similar robot systems have been deployed in Iraq and elsewhere but their method of operation is such that it is impractical to use in non-combat situations. We will discuss our design and possible deployment scenarios.
ieee international conference on technologies for homeland security | 2007
Phillip C. Womble; J. Spadaro; M. A. Harrison; Alexander Barzilov; D. Harper; B. Lemoff; R. Martin; Ivan Novikov; Jon Paschal; Lindsay Hopper; C. Davenport; J. Lodmell
Pressurized rail tank cars transport large volumes of volatile liquids and gases throughout the country, much of which is hazardous and/or flammable. Our group is developing a trackside inspection system for these tank cars. It consists of five narrow frequency band pressure sensors with center frequencies of 40 and 75 kHz, a broad band microphone for sound normalization and three video cameras. In addition, a 5 cm times 5 cm NaI(Tl) radiation detector provides radiological data on the passing trains every 60 seconds. During operation, an audio frequency spectrum is associated with each frame of the video camera as the train passes by the system at normal speeds, and the spectra are inspected for high frequency sounds associated with leaks. A 10 m tall tower houses the system positioned approximately 10 m from the center of a rail line and siding located in Bowling Green, KY (USA). The system is controlled by a website and server located at the tower and the Internet connection utilizes WiFi (802.11 g) radios.
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VI | 2007
Phillip C. Womble; J. Spadaro; M. A. Harrison; Alexander Barzilov; D. Harper; Lindsay Hopper; E. Houchins; B. Lemoff; R. Martin; C. McGrath; R. Moore; Ivan Novikov; Jon Paschal; S. Rogers
Pressurized rail tank cars transport large volumes of volatile liquids and gases throughout the country, much of which is hazardous and/or flammable. These gases, once released in the atmosphere, can wreak havoc with the environment and local populations. We developed a system which can non-intrusively and non-invasively detect and locate pinhole-sized leaks in pressurized rail tank cars using acoustic sensors. The sound waves from a leak are produced by turbulence from the gas leaking to the atmosphere. For example, a 500 μm hole in an air tank pressurized to 689 kPa produces a broad audio frequency spectrum with a peak near 40 kHz. This signal is detectable at 10 meters with a sound pressure level of 25 dB. We are able to locate a leak source using triangulation techniques. The prototype of the system consists of a network of acoustic sensors and is located approximately 10 meters from the center of the rail-line. The prototype has two types of acoustic sensors, each with different narrow frequency response band: 40 kHz and 80 kHz. The prototype is connected to the Internet using WiFi (802.11g) transceiver and can be remotely operated from anywhere in the world. The paper discusses the construction, operation and performance of the system.
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VI | 2007
Phillip C. Womble; Jon Paschal; Lindsay Hopper; Dudley Pinson; Frederick J. Schultz; Melinda Whitfield Humphrey
Due to the ever increasing use of radioactive materials in day to day living from the treatment of cancer patients and irradiation of food for preservation to industrial radiography to check for defects in the welding of pipelines and buildings there is a growing concern over the tracking and monitoring of these sources in transit prior to use as well as the waste produced by such use. The prevention of lost sealed sources is important in reducing the environmental and health risk posed by direct exposure, co-mingling in the metal recycling stream, use in contaminated consumer products, and use in terrorist activities. Northwest Nuclear, LLC (NWN) and the Applied Physics Institute (API) at Western Kentucky University have developed a tracking technology using active radio frequency identification (RFID) tags. This system provides location information by measuring the time of arrival of packets from a set of RFID tags to a set of location receivers. The system can track and graphically display the location on maps, drawings or photographs of tagged items on any 802.11- compliant device (PDAs, laptops, computers, WiFi telephones) situated both outside and inside structures. This location information would be vital for tracking the location of high level radiological sources while in transit. RFID technology would reduce the number of lost sources by tracking them from origination to destination. Special tags which indicate tampering or sudden movement have also been developed.
Bulletin of the American Physical Society | 2006
Alexander Barzilov; Phillip C. Womble; Jon Paschal; Lindsay Hopper; Ryan Moore; Eric Houchins; Jeremy Board