Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 10801 - 10830 of 12808

Full-Text Articles in Physical Sciences and Mathematics

An Evaluation Of Windows-Based Computer Forensics Application Software Running On A Macintosh, Gregory H. Carlton Jan 2008

An Evaluation Of Windows-Based Computer Forensics Application Software Running On A Macintosh, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems are marketed with the ability to accommodate these three common operating system environments, including Windows XP in native and virtual environments. We performed a series of experiments to measure the functionality and performance of the two …


To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea Jan 2008

To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea

Journal of Digital Forensics, Security and Law

In this paper the authors examine statutes that regulate, license, and enforce investigative functions in each US state. After identification and review of Private Investigator licensing requirements, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. After contacting all state agencies the authors present a distinct grouping organizing state approaches to professional Digital Examiner licensing. The authors conclude that states must differentiate between Private Investigator and Digital Examiner licensing requirements and oversight.


Book Review: Guide To Computer Forensics And Investigations (3rd Ed.), Keyu Jiang, Ruifeng Xuan Jan 2008

Book Review: Guide To Computer Forensics And Investigations (3rd Ed.), Keyu Jiang, Ruifeng Xuan

Journal of Digital Forensics, Security and Law

No abstract provided.


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


Extraction And Categorisation Of User Activity From Windows Restore Points, Damir Kahvedžić, Tahar Kechadi Jan 2008

Extraction And Categorisation Of User Activity From Windows Restore Points, Damir Kahvedžić, Tahar Kechadi

Journal of Digital Forensics, Security and Law

The extraction of the user activity is one of the main goals in the analysis of digital evidence. In this paper we present a methodology for extracting this activity by comparing multiple Restore Points found in the Windows XP operating system. The registry copies represent a snapshot of the state of the system at a certain point in time. Differences between them can reveal user activity from one instant to another. The algorithms for comparing the hives and interpreting the results are of high complexity. We develop an approach that takes into account the nature of the investigation and the …


Data Recovery From Palmmsgv001, Satheesaan Pasupatheeswaran Jan 2008

Data Recovery From Palmmsgv001, Satheesaan Pasupatheeswaran

Journal of Digital Forensics, Security and Law

Both SMS and MMS data analysis is an important factor in mobile forensic analysis. Author did not find any mobile forensic tool that is capable of extracting short messages (SMS) and multimedia messages (MMS) from Palm Treo 750. SMS file of Palm Treo 750 is called PalmMgeV001 and it is a proprietary file system. A research work done to find a method to recover SMS data from PalmMsgV001 file. This paper is going to describe the research work and its findings. This paper also discusses a methodology that will help recover SMS data from PalmMsgV001. The PalmMsgV001 file is analysed …


Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler Jan 2008

Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler

Journal of Digital Forensics, Security and Law

Apple's hold on the personal computer marketplace started dwindling on August 12, 1981, the day that the IBM PC was introduced. As an Apple ][+ bigot myself, I refused to touch a PC for some years. But I was also a command line bigot, so when the first Macintosh was introduced in 1983 and hermetically sealed the operating system from users, I did not go out and buy one. In fact, like many of my era, I did eventually end up on the PC side which, ironically, let me do many of the things that my trusty Apple ][+ had …


Table Of Contents Jan 2008

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


A Framework To Support Spatial, Temporal And Thematic Analytics Over Semantic Web Data, Matthew Steven Perry Jan 2008

A Framework To Support Spatial, Temporal And Thematic Analytics Over Semantic Web Data, Matthew Steven Perry

Browse all Theses and Dissertations

Spatial and temporal data are critical components in many applications. This is especially true in analytical applications ranging from scientific discovery to national security and criminal investigation. The analytical process often requires uncovering and analyzing complex thematic relationships between disparate people, places and events. Fundamentally new query operators based on the graph structure of Semantic Web data models, such as semantic associations, are proving useful for this purpose. However, these analysis mechanisms are primarily intended for thematic relationships. This dissertation proposes a framework built around the RDF data model for analysis of thematic, spatial and temporal relationships between named entities. …


Evolutionary Algorithms For The Unit Commitment Problem, A. Şi̇ma Uyar, Belgi̇n Türkay Jan 2008

Evolutionary Algorithms For The Unit Commitment Problem, A. Şi̇ma Uyar, Belgi̇n Türkay

Turkish Journal of Electrical Engineering and Computer Sciences

This paper compares three evolutionary computation techniques, namely Steady-State Genetic Algorithms, Evolutionary Strategies and Differential Evolution for the Unit Commitment Problem. The comparison is based on a set of experiments conducted on benchmark datasets as well as on real-world data obtained from the Turkish Interconnected Power System. The results of two state-of-the-art evolutionary approaches, namely a Generational Genetic Algorithm and a Memetic Algorithm for the same benchmark datasets are also included in the paper for comparison. The tests show that Differential Evolution is the best performer among all approaches on the test data used in the paper. The performances of …


A Study On The Reliability Of Polyester Insulators Blended With Borax, Aysel Ersoy, Yasi̇n Özcelep, Ayten Kuntman Jan 2008

A Study On The Reliability Of Polyester Insulators Blended With Borax, Aysel Ersoy, Yasi̇n Özcelep, Ayten Kuntman

Turkish Journal of Electrical Engineering and Computer Sciences

Tracking is the main factor which limits the safe working electric stress of insulation in power system applications. Polymer samples have been tested in laboratory conditions according to ASTM D2303 on accelerated inclined plane tracking test. In this paper, a model based on improved Weibull statistics is proposed for estimating the breakdown time of polymeric insulating materials with borax. The confidence intervals of the Weibull shape parameter and the Weibull scale parameter are determined for the borax concentration values using the Weibull 7++ program.


Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry Jan 2008

Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry

Articles

Provisions for citizen involvement in the assessment of potential environmental effects of certain plans, programmes and projects are present in current legislation. An international survey revealed that public participation is common practice in European and some other countries worldwide. However, a number of issues are observed to affect public involvement in EIA/SEA processes and expert opinion differs when evaluating the effectiveness of existing participative methods. Results suggest that technology-aided methods can improve traditional participation processes. In particular, GIS has the potential to increase community knowledge and enhance involvement by communicating information more effectively. Variable accessibility to technology and data quality …


Evolutionary Methodology For Optimization Of Image Transforms Subject To Quantization Noise, Michael Ray Peterson Jan 2008

Evolutionary Methodology For Optimization Of Image Transforms Subject To Quantization Noise, Michael Ray Peterson

Browse all Theses and Dissertations

Lossy image compression algorithms sacrifice perfect imagereconstruction in favor of decreased storage requirements. Modelossy compression schemes, such as JPEG2000, rely upon the discrete wavelet transform (DWT) to achieve high levels of compression while minimizing the loss of information for image reconstruction. Some compression applications require higher levels of compression than those achieved through application of the DWT and entropy coding. In such lossy systems, quantization provides high compression rates at the cost of increased distortion. Unfortunately, as the amount of quantization increases, the performance of the DWT for accurate image reconstruction deteriorates. Previous research demonstrates that a genetic algorithm can …


Use Of Characteristic Basis Function Method For Scattering From Terrain Profiles, Atacan Yağbasan, Celal Alp Tunç, Vakur B. Ertürk, Ayhan Altintas, Raj Mittra Jan 2008

Use Of Characteristic Basis Function Method For Scattering From Terrain Profiles, Atacan Yağbasan, Celal Alp Tunç, Vakur B. Ertürk, Ayhan Altintas, Raj Mittra

Turkish Journal of Electrical Engineering and Computer Sciences

An integral equation (IE) based solution procedure is presented for the rigorous analysis of scattering from terrain profiles. The procedure uses characteristic basis function method (CBFM), which is hybridized with the forward-backward method (FBM), to reduce the storage requirements of the resultant Method of Moments (MoM) impedance matrix, as well as to accelerate the solution procedure. Numerical results in the form of induced current and scattered field are presented to assess the accuracy and efficiency of the solution procedure.


Comparison Of Rectangular And Cylindrical Fdtd Representations On A Ring Resonator Problem, Funda Akleman, Levent Sevgi̇ Jan 2008

Comparison Of Rectangular And Cylindrical Fdtd Representations On A Ring Resonator Problem, Funda Akleman, Levent Sevgi̇

Turkish Journal of Electrical Engineering and Computer Sciences

The aim of this paper is to discuss rectangular and cylindrical representations of finite-difference time-domain (FDTD) method over characteristic tests and comparisons. A ring resonator is chosen as a canonical structure and modeled with both rectangular- and cylindrical-FDTD packages. Calibration against analytical exact solution derived in terms of cylindrical Bessel functions is also performed. It is shown that rectangular-FDTD with periodic boundary condition, where the computation domain is reduced, can also be applied in modeling circular structures.


Biomedical Circuits And Systems Dedicated For Sensing And Neurostimulation: Case Study On Urinary Bladder Dysfunctions, Mohamad Sawan, Aguibou Ba, Faycal Mounaim, Jacques Corcos, Mostafa Elhilali Jan 2008

Biomedical Circuits And Systems Dedicated For Sensing And Neurostimulation: Case Study On Urinary Bladder Dysfunctions, Mohamad Sawan, Aguibou Ba, Faycal Mounaim, Jacques Corcos, Mostafa Elhilali

Turkish Journal of Electrical Engineering and Computer Sciences

This paper covers circuits and systems techniques for the construction of high reliability biosensing and neurostimulation smart medical devices. Such microsystems are dedicated for interconnections through the peripheral neural systems. Case study related to applications such as bladder control is discussed. Available electrical neurostimulation techniques for the rehabilitation of urinary bladder functions do not allow an adequate voiding due to dyssynergia between the bladder and the sphincter. A new implantable stimulator, built with commercially available electronic components, was designed to overcome these difficulties. The proposed system performs two types of stimulations: Selective Stimulation for bladder voiding and Permanent Stimulation to …


Recent Advances In Perfectly Matched Layers In Finite Element Applications, Özlem Özgün, Mustafa Kuzuoğlu Jan 2008

Recent Advances In Perfectly Matched Layers In Finite Element Applications, Özlem Özgün, Mustafa Kuzuoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

We present a comparative evaluation of two novel and practical perfectly matched layer (PML) implementations to the problem of mesh truncation in the finite element method (FEM): locally-conformal PML, and multi-center PML techniques. The most distinguished feature of these methods is the simplicity and flexibility to design conformal PMLs over challenging geometries, especially those with curvature discontinuities, in a straightforward way without using artificial absorbers. These methods are based on specially- and locally-defined complex coordinate transformations inside the PML region. They can easily be implemented in a conventional FEM by just replacing the nodal coordinates inside the PML region by …


Generation Of High-Repetition-Rate Pulses Utilizing Cascaded Single Mode Fiber And Semiconductor Optical Amplifier, Jianwei Wu, Hai-Bo Bao Jan 2008

Generation Of High-Repetition-Rate Pulses Utilizing Cascaded Single Mode Fiber And Semiconductor Optical Amplifier, Jianwei Wu, Hai-Bo Bao

Turkish Journal of Electrical Engineering and Computer Sciences

To generate high-repetition-rate optical pulses, a novel and simple device is demonstrated, in which the cascaded single mode fiber (SMF) with negative third order dispersion and semiconductor optical amplifier (SOA) are adopted. Numerical research results show that let an optical pulse with center wavelength in zero dispersion wavelength of optical fiber transit in SMF for generating an oscillation pulse. Subsequently, the followed SOA is provided for amplification. As a consequence, the high-repetition-rate optical pulses can be obtained.


Creating Preservation-Ready Web Resources, Joan A. Smith, Michael L. Nelson Jan 2008

Creating Preservation-Ready Web Resources, Joan A. Smith, Michael L. Nelson

Computer Science Faculty Publications

There are innumerable departmental, community, and personal web sites worthy of long-term preservation but proportionally fewer archivists available to properly prepare and process such sites. We propose a simple model for such everyday web sites which takes advantage of the web server itself to help prepare the site's resources for preservation. This is accomplished by having metadata utilities analyze the resource at the time of dissemination. The web server responds to the archiving repository crawler by sending both the resource and the just-in-time generated metadata as a straight-forward XML-formatted response. We call this complex object (resource + metadata) a CRATE. …


Efficient Corona Training Protocols For Sensor Networks, Alan A. Bertossi, Stephan Olariu, Cristina M. Pinotti Jan 2008

Efficient Corona Training Protocols For Sensor Networks, Alan A. Bertossi, Stephan Olariu, Cristina M. Pinotti

Computer Science Faculty Publications

Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireless communications capabilities. It is expected that these small devices, referred to as sensors, will be mass-produced and deployed, making their production cost negligible. Due to their small form factor and modest non-renewable energy budget, individual sensors are not expected to be GPS-enabled. Moreover, in most applications, exact geographic location is not necessary, and all that the individual sensors need is a coarse-grain location awareness. The task of acquiring such a coarse-grain location awareness is referred to as training. …


Byzantium Beneath The Black Sea, Bridget Buxton, Robert Ballard, Michael Brennan, Dwight Coleman, Katy Croff, Christopher Roman, Dan Davis, Dennis Piechota, Sergiy Voronov Jan 2008

Byzantium Beneath The Black Sea, Bridget Buxton, Robert Ballard, Michael Brennan, Dwight Coleman, Katy Croff, Christopher Roman, Dan Davis, Dennis Piechota, Sergiy Voronov

Graduate School of Oceanography Faculty Publications

This poster reports on the August 2007 Black Sea Expedition of the Institute for Archaeological Oceanography at the University of Rhode Island (IAO) and the Institute for Exploration (IFE), in collaboration with the Department of the Underwater Heritage of Ukraine. This year’s work marks a new phase in a multi-year (2000–2012) archaeological and oceanographic survey of the Black Sea. 2007 fieldwork focuses on two Byzantine shipwrecks. The 10th century C.E. shipwreck Chersonesos A (discovered in 2006) lies at 140 m depth in the suboxic zone off the Crimean peninsula. The ship carried a cargo of one-handled jars of a widely …


My Collaboration With Raj Mittra: Contributions To The Theory Of Perfectly Matched Layers, Mustafa Kuzuoğlu Jan 2008

My Collaboration With Raj Mittra: Contributions To The Theory Of Perfectly Matched Layers, Mustafa Kuzuoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

No abstract provided.


From Engineering Electromagnetics To Electromagnetic Engineering: Using Computational Electromagnetics For Synthesis Problems, Anton G. Tijhuis, Martijn C. Van Beurden, Bastiaan P. De Hon, Hubregt J. Visser Jan 2008

From Engineering Electromagnetics To Electromagnetic Engineering: Using Computational Electromagnetics For Synthesis Problems, Anton G. Tijhuis, Martijn C. Van Beurden, Bastiaan P. De Hon, Hubregt J. Visser

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a two-stage approach is proposed for using computational electromagnetics in antenna engineering. First, stochastic optimization techniques are used in combination with approximate models. Second, line-search techniques are combined with full-wave modeling. For the first stage, we show an illustrative example. The second stage is considered in detail; both the acceleration of the underlying field computations and the implementation of the optimization are discussed.


The Characteristic Basis Function Method (Cbfm): A Numerically Efficient Strategy For Solving Large Electromagnetic Scattering Problems, Eugenio Lucente, Gianluigi Tiberi, Agostino Monorchio, Giuliano Manara, Raj Mittra Jan 2008

The Characteristic Basis Function Method (Cbfm): A Numerically Efficient Strategy For Solving Large Electromagnetic Scattering Problems, Eugenio Lucente, Gianluigi Tiberi, Agostino Monorchio, Giuliano Manara, Raj Mittra

Turkish Journal of Electrical Engineering and Computer Sciences

The objective of this paper is to describe a numerically efficient strategy for solving large electromagnetic scattering problems. This novel approach, termed as the Characteristic Basis Function Method (CBFM), is based on utilizing Characteristic Basic Functions (CBFs)-special functions defined on macro domains (blocks)-that include a relatively large number of conventional sub-domains discretized by using triangular or rectangular patches. The CBFs can be derived either analytically (from PO solutions), or by applying the conventional MoM. Use of these basis functions leads to a significant reduction in the number of unknowns, and results in a substantial size reduction of the MoM matrix. …


Analysis And Optimization Of Mobile Phone Antenna Radiation Performance In The Presence Of Head And Hand Phantoms, Erdem Ofli, Chung-Huan Li, Nicolas Chavannes, Niels Kuster Jan 2008

Analysis And Optimization Of Mobile Phone Antenna Radiation Performance In The Presence Of Head And Hand Phantoms, Erdem Ofli, Chung-Huan Li, Nicolas Chavannes, Niels Kuster

Turkish Journal of Electrical Engineering and Computer Sciences

A commercial clam shell phone CAD model is used to numerically investigate the effect of a hand phantom on mobile phone antenna radiation performance. The simulation results show that the grip of the hand phantom is the most important parameter to antenna performance. The antenna is converted into a parameterized form, then optimized to achieve the targeted multi-band performance in real-usage conditions.


Dual-Band Split-Ring Antenna Design For Wlan Applications, S. Cumhur Başaran, Yunus E. Erdemli̇ Jan 2008

Dual-Band Split-Ring Antenna Design For Wlan Applications, S. Cumhur Başaran, Yunus E. Erdemli̇

Turkish Journal of Electrical Engineering and Computer Sciences

A dual-band microstrip antenna based on split-ring elements is introduced for WLAN (2.4/5.2 GHz) applications. The proposed split-ring antenna (SRA) has a compact novel design which provides about 2% impedance-bandwidth without a need for additional matching network. Analysis and design of the proposed microstrip antenna is carried out by means of full-wave simulators based on the finite-element method.


Method Of Moments Solution By Using Sinc-Type Basis Functions For The Scattering From A Finite Number Of Conducting Strip Gratings, Taner Oğuzer, Fadil Kuyucuoğlu Jan 2008

Method Of Moments Solution By Using Sinc-Type Basis Functions For The Scattering From A Finite Number Of Conducting Strip Gratings, Taner Oğuzer, Fadil Kuyucuoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

A numerical method of moments (MoM) solution is applied to the electromagnetic scattering from a periodic finite conducting strip array when the incident electromagnetic plane wave E and H polarizations illuminate the grating. For such grating strip geometry, we deal with singular integral equations arising from Neumann and Dirichlet boundary conditions. MoM is applied using band-limited sinc functions as basis and testing functions. The Galerkin approach is followed in MoM formulation. The properties of the sinc function, with the infinite integral, are exploited in the computations of the main matrix elements. Also, the error in our approach goes to zero …


Zero Crossing Counter For Accuracy Improvement Of Fmcw Range Detection, Si̇nan Kurt, Şi̇mşek Demi̇r, Altunkan Hizal Jan 2008

Zero Crossing Counter For Accuracy Improvement Of Fmcw Range Detection, Si̇nan Kurt, Şi̇mşek Demi̇r, Altunkan Hizal

Turkish Journal of Electrical Engineering and Computer Sciences

For civil and military purposes FMCW radars are widely used. The theoretical background is well-established. Nevertheless, improvement of various aspects of these radars is still required. Signal processing is one of the crucial points of the system which determines the capabilities of the radar. In this study a zero crossing detector implementation, which can be efficiently used for target detection and range calculation in short range FMCW range detector is proposed. The duration between consecutive zero-crossings are used as the data instead of the number of cycles per unit time. Experimental evaluation of its performance is also given.


A Novel Theoretical Procedure To Determine Absorption And Gain Coefficients In A Symmetric Single Step-Index Quantum Well Laser, Mustafa Temi̇z, Özgür Önder Karakilinç, Mehmet Ünal Jan 2008

A Novel Theoretical Procedure To Determine Absorption And Gain Coefficients In A Symmetric Single Step-Index Quantum Well Laser, Mustafa Temi̇z, Özgür Önder Karakilinç, Mehmet Ünal

Turkish Journal of Electrical Engineering and Computer Sciences

If the indices n_{II}, n_{I,III} of the regions, the thickness 2a of the active region (AR) and the wavelength \lambda for a single symmetric step-index quantum well laser (SSSIQWL) are given, the normalized propagation constant (NPC) \alpha is obtained. In this novel method, absorption and gain coefficients for the SSSIQWL have been obtained in terms of the NPCs \alpha in the even and odd fields, directly.


Online Tuning Of Set-Point Regulator With A Blending Mechanism Using Pi Controller, Engi̇n Yeşi̇l, Müjde Güzelkaya, İbrahi̇m Eksi̇n, Ö. Aydin Teki̇n Jan 2008

Online Tuning Of Set-Point Regulator With A Blending Mechanism Using Pi Controller, Engi̇n Yeşi̇l, Müjde Güzelkaya, İbrahi̇m Eksi̇n, Ö. Aydin Teki̇n

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a new control structure that exploits the advantages of one degree of freedom (1-DOF) and two degree of freedom (2-DOF) control structures with an online tuned set-point regulator with blending mechanism (SPR-BM) is proposed. In this structure, the filtered output of the reference and the pure reference signals are blended so that the overall performance of the system is ameliorated with respect to load disturbance rejection and set-point following. Internal Model Control (IMC) based PI controller is used as the primary controller and the blending dynamics are determined with the aim of producing a system output that …