Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 10171 - 10200 of 12811

Full-Text Articles in Physical Sciences and Mathematics

Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum Jan 2010

Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …


Trust Account Fraud And Effective Information Security Management, Sameera Mubarak Jan 2010

Trust Account Fraud And Effective Information Security Management, Sameera Mubarak

Journal of Digital Forensics, Security and Law

The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …


Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin Jan 2010

Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin

Journal of Digital Forensics, Security and Law

The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic …


Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward Jan 2010

Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward

Journal of Digital Forensics, Security and Law

Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …


The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies Jan 2010

The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies

Journal of Digital Forensics, Security and Law

The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …


Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma Jan 2010

Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma

Journal of Digital Forensics, Security and Law

The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers involved. …


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Algebraic Theories Over Nominal Sets, Alexander Kurz, Daniela Petrişan, Jiří Velebil Jan 2010

Algebraic Theories Over Nominal Sets, Alexander Kurz, Daniela Petrişan, Jiří Velebil

Engineering Faculty Articles and Research

We investigate the foundations of a theory of algebraic data types with variable binding inside classical universal algebra. In the first part, a category-theoretic study of monads over the nominal sets of Gabbay and Pitts leads us to introduce new notions of finitary based monads and uniform monads. In a second part we spell out these notions in the language of universal algebra, show how to recover the logics of Gabbay-Mathijssen and Clouston-Pitts, and apply classical results from universal algebra.


State Variable Distributed-Parameter Representation Of Transmission Line For Transient Simulations, Mehmet Sali̇h Mami̇ş, Asim Kaygusuz, Muhammet Köksal Jan 2010

State Variable Distributed-Parameter Representation Of Transmission Line For Transient Simulations, Mehmet Sali̇h Mami̇ş, Asim Kaygusuz, Muhammet Köksal

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a distributed-parameter state variable approach is used to calculate transients on transmission lines based on the concept of travelling waves. The method of characteristics for lossless line is used and the state equations are derived for the system. These equations are converted to a set of difference equations using the trapezoidal rule of integration and solved in time domain using LU decomposition. Single- and multi-phase transmission lines with various linear and non-linear terminations are considered in the illustrative examples. State-space modeling of transposed lines using modal decomposition is introduced and the effects caused by lumped parameter approximation …


M&S Body Of Knowledge: Progress Report And Look Ahead, Andreas Tolk Jan 2010

M&S Body Of Knowledge: Progress Report And Look Ahead, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

No abstract provided.


Artificial Neural Network Based Chaotic Generator For Cryptology, İlker Dalkiran, Kenan Danişman Jan 2010

Artificial Neural Network Based Chaotic Generator For Cryptology, İlker Dalkiran, Kenan Danişman

Turkish Journal of Electrical Engineering and Computer Sciences

Chaotic systems are sensitive to initial conditions, system parameters and topological transitivity and these properties are also remarkable for cryptanalysts. Noise like behavior of chaotic systems is the main reason of using these systems in cryptology. However some properties of chaotic systems such as synchronization, fewness of parameters etc. cause serious problems for cryptology. In this paper, to overcome disadvantages of chaotic systems, the dynamics of Chua's circuit namely x, y and z were modeled using Artificial Neural Network (ANN). ANNs have some distinctive capabilities like learning from experiences, generalizing from a few data and nonlinear relationship between inputs and …


Filter Scheduling Function Model In Internet Server: Resource Configuration, Performance Evaluation And Optimal Scheduling, Minghua Xu Jan 2010

Filter Scheduling Function Model In Internet Server: Resource Configuration, Performance Evaluation And Optimal Scheduling, Minghua Xu

Wayne State University Dissertations

ABSTRACT

FILTER SCHEDULING FUNCTION MODEL IN INTERNET SERVER:

RESOURCE CONFIGURATION, PERFORMANCE EVALUATION AND

OPTIMAL SCHEDULING

by

MINGHUA XU

August 2010

Advisor: Dr. Cheng-Zhong Xu

Major: Computer Engineering

Degree: Doctor of Philosophy

Internet traffic often exhibits a structure with rich high-order statistical properties like selfsimilarity

and long-range dependency (LRD). This greatly complicates the problem of

server performance modeling and optimization. On the other hand, popularity of Internet

has created numerous client-server or peer-to-peer applications, with most of them,

such as online payment, purchasing, trading, searching, publishing and media streaming,

being timing sensitive and/or financially critical. The scheduling policy in Internet servers …


Families Of Symmetries As Efficient Models Of Resource Binding, Vincenzo Ciancia, Alexander Kurz, Ugo Montanari Jan 2010

Families Of Symmetries As Efficient Models Of Resource Binding, Vincenzo Ciancia, Alexander Kurz, Ugo Montanari

Engineering Faculty Articles and Research

Calculi that feature resource-allocating constructs (e.g. the pi-calculus or the fusion calculus) require special kinds of models. The best-known ones are presheaves and nominal sets. But named sets have the advantage of being finite in a wide range of cases where the other two are infinite. The three models are equivalent. Finiteness of named sets is strictly related to the notion of finite support in nominal sets and the corresponding presheaves. We show that named sets are generalisd by the categorical model of families, that is, free coproduct completions, indexed by symmetries, and explain how locality of interfaces gives good …


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Determination Of Autoregressive Model Orders For Seizure Detection, Serap Aydin Jan 2010

Determination Of Autoregressive Model Orders For Seizure Detection, Serap Aydin

Turkish Journal of Electrical Engineering and Computer Sciences

In the present study, a step-wise least square estimation algorithm (SLSA), implemented in a Matlab package called as ARfit, has been newly applied to clinical data for estimation of the accurate Auto-Regressive (AR) model orders of both normal and ictal EEG series where the power spectral density (PSD) estimations are provided by the Burg Method. The ARfit module is found to be usefull in comparison to a large variety of traditional methods such as Forward Prediction Error (FPE), Akaike's Information Criteria (AIC), Minimum Description Lenght (MDL), and Criterion of Autoregressive Transfer function (CAT) for EEG discrimination. According to tests, the …


P2p Collaborative Filtering With Privacy, Ci̇han Kaleli̇, Hüseyi̇n Polat Jan 2010

P2p Collaborative Filtering With Privacy, Ci̇han Kaleli̇, Hüseyi̇n Polat

Turkish Journal of Electrical Engineering and Computer Sciences

With the evolution of the Internet and e-commerce, collaborative filtering (CF) and privacy-preserving collaborative filtering (PPCF) have become popular. The goal in CF is to generate predictions with decent accuracy, efficiently. The main issue in PPCF, however, is achieving such a goal while preserving users' privacy. Many implementations of CF and PPCF techniques proposed so far are centralized. In centralized systems, data is collected and stored by a central server for CF purposes. Centralized storage poses several hazards to users because the central server controls users' data. In this work, we investigate how to produce naïve Bayesian classifier (NBC)-based recommendations …


Experimental Studies Of A Scaled-Down Tsr-Based Svc And Tcr-Based Svc Prototype For Voltage Regulation And Compensation, Ayetül Gelen, Tankut Yalçinöz Jan 2010

Experimental Studies Of A Scaled-Down Tsr-Based Svc And Tcr-Based Svc Prototype For Voltage Regulation And Compensation, Ayetül Gelen, Tankut Yalçinöz

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, prototypes of two shunt flexible AC transmission system (FACTS) devices, a thyristor switched reactor (TSR)-based static VAr compensator (SVC) and a thyristor controlled reactor (TCR)-based static VAr compensator- have been developed. The design and testing of both a TSR-based SVC and a TCR-based SVC are accomplished in the Power Systems Research Laboratory of Nigde University. The TSR-based SVC and TCR-based SVC devices are studied in three-bus and single machine infinite bus systems for three-phase static load conditions. The effects of TSR-based SVC and TCR-based SVC devices on load voltages are also analyzed. Experimental results show that significant …


Robust Multimedia Watermarking: Hidden Markov Model Approach For Video Sequences, Ersi̇n Elbaşi Jan 2010

Robust Multimedia Watermarking: Hidden Markov Model Approach For Video Sequences, Ersi̇n Elbaşi

Turkish Journal of Electrical Engineering and Computer Sciences

Because of the large amount of frames, similarity between frames and temporal attacks (frame dropping, frame averaging, frame swapping etc.), the process for video watermarking is more difficult than that for image watermarking. Current image watermarking methods are limited to solve all these difficulties. We propose a novel video watermarking system based on the Hidden Markov Model (HMM). This novel watermarking scheme splits the video sequences into a Group of Pictures (GOP) with HMM. Portions of the binary watermark are embedded into each GOP with a wavelet domain watermarking algorithm. The embedding process is the standard additive algorithm [1] in …


The Effect Of Heat On The Metallurgical Structure And B-H Characteristic Of (Stator) Armature With Iron-Silicon Alloy In Electric Machines, Fevzi̇ Kentli̇, Ümi̇t Kemaletti̇n Terzi̇ Jan 2010

The Effect Of Heat On The Metallurgical Structure And B-H Characteristic Of (Stator) Armature With Iron-Silicon Alloy In Electric Machines, Fevzi̇ Kentli̇, Ümi̇t Kemaletti̇n Terzi̇

Turkish Journal of Electrical Engineering and Computer Sciences

Coils in electric machines are varnished for insulation after winding. These varnished coils are formed in stiff construction in slots. Under heavy-duty operating conditions, all or part of some coils may be burnt or broken. Thermal method is one of several ways to remove the defective coils. In this method, current is passed through the defective coils by an autotransformer (variac) until all the varnish of the coils is burned. If all the coils are out of order, the varnish is burned by replacing the stator or armature in a burning room. Consequently, defective coils in the stator (armature) slots …


Nonlinear Dynamic Analysis Of Mitral Valve Doppler Signals: Surrogate Data Analysis, Esma Uzunhi̇sarcikli Jan 2010

Nonlinear Dynamic Analysis Of Mitral Valve Doppler Signals: Surrogate Data Analysis, Esma Uzunhi̇sarcikli

Turkish Journal of Electrical Engineering and Computer Sciences

In our study, the nonlinear dynamics of mitral valve Doppler signals from 32 healthy and 28 patients with mitral valve stenosis was evaluated using by the computation of Lyapunov exponents, correlation dimension values and surrogate data analysis. Two chaotic features are compared for healthy and patient subjects. It was found that the largest Lyapunov exponent and correlation dimension values derived from patient subjects were larger than that of healthy subjects (\rho < 0.005). Surrogate data analysis was performed to determine the chaotic dynamics of Doppler signals. It was observed that the original and surrogate data have similar spectral features. Receiver operating characteristic (ROC) curves were used to evaluate the nonlinearity character Area Under the curve (AUC) values were obtained as 0.99 and 0.978 for the largest Lyapunov exponent and correlation dimension values, respectively. According to these results, Doppler signals have a nonlinear dynamic property and the largest Lyapunov exponent. Correlation dimension features can be used to detect the change in blood flow velocity of patients with mitral valve stenosis.


A Review Of High Frequency Surface Wave Radar For Detection And Tracking Of Ships, Tony Ponsford, Jian Wang Jan 2010

A Review Of High Frequency Surface Wave Radar For Detection And Tracking Of Ships, Tony Ponsford, Jian Wang

Turkish Journal of Electrical Engineering and Computer Sciences

In today's resource-driven economy, maritime nations are claiming economic borders that extend beyond the continental shelf or the 200 nautical mile (nm) Exclusive Economic Zone (EEZ). However, claiming such large economic area places responsibilities on the parent nation to exercise jurisdiction through surveillance and enforcement. The requirement to see beyond the horizon has long been a goal of maritime security forces. Today, this is largely dependent on cooperative vessels voluntarily communicating their intentions to local shore-side authorities, as well as on those vessel sightings reported by patrollers. Recent advances in technology provide maritime nations with options to provide more systematic …


Implementation Of Method For Operating Multiple High Frequency Surface Wave Radars On A Common Carrier Frequency, Ryan Riddolls Jan 2010

Implementation Of Method For Operating Multiple High Frequency Surface Wave Radars On A Common Carrier Frequency, Ryan Riddolls

Turkish Journal of Electrical Engineering and Computer Sciences

The increasing use of High Frequency Surface Wave Radar (HFSWR) for the surveillance of coastal regions is faced with the problem of limited channel availability in the electromagnetic spectrum. Thus, there is a need for multiple radars to share a common frequency channel. Proof-of-concept work is presented here for a method to operate multiple radar systems on a common carrier frequency. A review is provided of an existing concept where a common waveform is modulated by tones varying by a few hertz across the different radars. The signals from the different radars are separated by either pulse-domain filtering or Doppler …


Propagation Modeling And Path Loss Prediction Tools For High Frequency Surface Wave Radars, Gökhan Apaydin, Levent Sevgi̇ Jan 2010

Propagation Modeling And Path Loss Prediction Tools For High Frequency Surface Wave Radars, Gökhan Apaydin, Levent Sevgi̇

Turkish Journal of Electrical Engineering and Computer Sciences

Propagation modeling and simulation approaches for the use of High Frequency Surface Wave Radar (HFSWR) are discussed. HFSWR uses vertically polarized surface waves along multi-mixed paths in the lower HF band (3 MHz - 15 MHz). Various numerical propagators are reviewed with an early analytical model. Split Step Fast Fourier Transformation, finite- difference, and finite-element solutions of the well-known one-way, forward propagation Parabolic Equation (PE) model are presented. MATLAB-based numerical propagation prediction tools based on these models are listed. Tests and comparisons among these analytical and numerical tools are given for some canonical surface wave propagation scenarios. The Millington effect …


Antenna Systems With Beam Forming And Beam Steering Capabilities For Hf Skywave Radars, Çağatay Uluişik Jan 2010

Antenna Systems With Beam Forming And Beam Steering Capabilities For Hf Skywave Radars, Çağatay Uluişik

Turkish Journal of Electrical Engineering and Computer Sciences

Radiation characteristics of linearly phased, periodic, planar dipole arrays, which can be used as transmitting/receiving antenna systems for HF skywave radars, are investigated. Rectangular, triangular and trapezoidal arrays are proposed in obtaining different beam shapes in the desired directions. Beam steering is achieved by adjusting the inter-element phase increments coherently. The effects of vertical array-tilt with a desired take-off angle (TOA) \alpha are presented by a number of radiation pattern examples. The ground effect is investigated using the image theory by assuming the Earth's surface as perfectly electric conductor (PEC). Radiated fields are obtained using Floquet wave representations plus the …


Active Illumination And Appearance Model For Face Alignment, Muhi̇tti̇n Gökmen, Fati̇h Kahraman, Sune Darkner, Rasmus Larsen Jan 2010

Active Illumination And Appearance Model For Face Alignment, Muhi̇tti̇n Gökmen, Fati̇h Kahraman, Sune Darkner, Rasmus Larsen

Turkish Journal of Electrical Engineering and Computer Sciences

Illumination conditions have an explicit effect on the performance of face recognition systems. In particular, varying the illumination upon the face imposes such complex effects that the identification often fails to provide a stable performance level. In this paper, we propose an approach integrating face identity and illumination models in order to reach acceptable and stable face recognition rates. For this purpose, Active Appearance Model (AAM) and illumination model of faces are combined in order to obtain an illumination invariant face localization. The proposed method is an integrated Active Illumination and Appearance Model (AIA) which combines identity, illumination and shape …


Formation Control Of Nonholonomic Mobile Robots Using Implicit Polynomials And Elliptic Fourier Descriptors, Yeşi̇m Hümay Esi̇n, Mustafa Ünel Jan 2010

Formation Control Of Nonholonomic Mobile Robots Using Implicit Polynomials And Elliptic Fourier Descriptors, Yeşi̇m Hümay Esi̇n, Mustafa Ünel

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a novel method for the formation control of a group of nonholonomic mobile robots using implicit and parametric descriptions of the desired formation shape. The formation control strategy employs implicit polynomial (IP) representations to generate potential fields for achieving the desired formation and the elliptical Fourier descriptors (EFD) to maintain the formation once achieved. Coordination of the robots is modeled by linear springs between each robot and its two nearest neighbors. Advantages of this new method are increased flexibility in the formation shape, scalability to different swarm sizes and easy implementation. The shape formation control is first …


Simultaneous Rotor And Stator Resistance Estimation Of Squirrel Cage Induction Machine With A Single Extended Kalman Filter, Eşref Emre Özsoy, Meti̇n Gökaşan, Ovsanna Seta Estrada Jan 2010

Simultaneous Rotor And Stator Resistance Estimation Of Squirrel Cage Induction Machine With A Single Extended Kalman Filter, Eşref Emre Özsoy, Meti̇n Gökaşan, Ovsanna Seta Estrada

Turkish Journal of Electrical Engineering and Computer Sciences

Accurate knowledge of rotor and stator resistance variations in a squirrel-cage induction motor (SCIM) is crucial for the performance of sensorless control of SCIM over a wide range of speeds. This study seeks to address this issue with a single Extended Kalman Filter (EKF) based solution, which is also known to have accuracy limitations when a high number of parameters/states are estimated with a limited number of inputs. To this aim, different from the author's previous approach in operating several EKFs in an alternating manner (the so-called braided EKF), an 8^{th}-order EKF is implemented in this study to test its …


Precise Position Control Using Shape Memory Alloy Wires, Burcu Dönmez, Bülent Özkan, Fevzi̇ Suat Kadioğlu Jan 2010

Precise Position Control Using Shape Memory Alloy Wires, Burcu Dönmez, Bülent Özkan, Fevzi̇ Suat Kadioğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Shape memory alloys (SMAs) are active metallic ``smart'' materials used as actuators and sensors in high technology smart systems [1]. The term shape memory refers to ability of certain materials to ``remember'' a shape, even after rather severe deformations: once deformed at low temperatures, these materials will stay deformed until heated, whereupon they will return to their original, pre-deformed ``learned'' shape [2]. This property can be used to generate motion and/or force in electromechanical devices and micro-machines. However, the accuracy of SMA actuators is severely limited by their highly nonlinear stimulus-response characteristics. In this work, modeling, simulation, and experimental efforts …


The Use Of Fpga In Field-Oriented Control Of An Induction Machine, Özkan Akin, İrfan Alan Jan 2010

The Use Of Fpga In Field-Oriented Control Of An Induction Machine, Özkan Akin, İrfan Alan

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, the feasibility of embedding the field oriented control (FOC) of an induction machine into field programmable gate arrays (FPGA) is investigated. An indirect FOC of an induction machine is simulated in a Matlab Simulink environment using a Xilinx System Generator implemented in a Xilinx Spartan-3 XC3S200 FPGA board. Design of the developed controller for the induction machine is simulated via a Simulink full digital platform. The resulting design has a flexible and modular structure where the designer can customize the hardware blocks by changing the number of inputs, outputs, and algorithm when it is compared to the …