Research Team: Tristan A. Goers, Researcher, University of Alaska Anchorage Dr. Caixia Wang, Mentor, University of […]
Research Team: Mohammad Heidari Kapourchali, University of Alaska Anchorage Matthew Berman, University of Alaska Anchorage Micah […]
Corrosion test rack
Research Team: Tyler Cushman, Graduate Student, University of Alaska Anchorage Dr. Raghu Srinivasan, Mentor, University of […]
This project seeks to extend the Arctic Vessel Monitoring Geofencing/Alert Awareness project, initially funded in ADAC Program Year 5, by providing enhanced command and control features that improve on the original goals of monitoring and alert awareness developed for the unclassified Marine Exchange PACTRACS system (which is a commercial mariner application).
Research Team: Gennady Gienko, Rob Lang, Scott Hamel, Kurt Meehleis, Tommy Folan Summary: In Alaska during […]
Tom Ravens and research assistant Jon Allen are developing a storm surge modeling system to examine […]
Tom Ravens and graduate student Garrett Yager completed a study (funded by the North Pacific Research Board) addressing the hydrodynamic and sediment transport impacts of the Endicott causeway on the North Slope of Alaska. Solid-filled causeways have been used along the Beaufort Sea coastline to support oil and gas drilling operations and to provide maritime access on a shallow coast.
This research assesses the riverine hydrokinetic energy resource in the Continental US for the Department of Energy. The team determined the theoretically available energy as well as the technically recoverable energy in river segments throughout the Continental US.
Researchers have proposed systems in which users utilize an eye tracker to enter passwords by merely looking at the proper symbols on the computer monitor in the appropriate order. This authentication method is immune to the practice of shoulder surfing: secretly observing the keystrokes of a legitimate user as he or she types a password on a keyboard.
The majority of today’s authentication systems, including password and fingerprint scanners, are based on one-time, static authentication methods.