Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 11071 - 11100 of 12808

Full-Text Articles in Physical Sciences and Mathematics

Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam Jan 2007

Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam

Journal of Digital Forensics, Security and Law

Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …


An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros Jan 2007

An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros

Journal of Digital Forensics, Security and Law

The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Jan 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Journal of Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


Book Review: Computer Forensics: Principles And Practices, Gary C. Kessler Jan 2007

Book Review: Computer Forensics: Principles And Practices, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the third Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


Umts-Hsdpa In High Altitude Platforms (Haps) Communications, Bazil Taha Ahmed, Miguel Calvo Ramon, Leandro De Haro-Ariet Jan 2007

Umts-Hsdpa In High Altitude Platforms (Haps) Communications, Bazil Taha Ahmed, Miguel Calvo Ramon, Leandro De Haro-Ariet

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, the performance of HAPs (High Altitudes Platforms) UMTS HSDPA (High Speed Downlink Packet Access) is studied for different HAPs height h, different cells radius R and two directions (0° and 30°) within the cell. The network under study is assumed to have 61 ground cells. It is noticed that, for urban zone users, the effective range is lower than the effective range for users in rural zones for a given modulation scheme. Also it is noticed that in rural zone, the HSDPA can support higher modulation schemes. It is noticed that, when 80% of the base station …


A New Relaying Algorithm To Detect Loss Of Excitation Of Synchronous Generators, Ömer Usta, M. H. Musa, M. Bayrak, M.A. Redfern Jan 2007

A New Relaying Algorithm To Detect Loss Of Excitation Of Synchronous Generators, Ömer Usta, M. H. Musa, M. Bayrak, M.A. Redfern

Turkish Journal of Electrical Engineering and Computer Sciences

A new digital relaying algorithm is introduced for the protection of synchronous generators against loss of excitation conditions. The new algorithm is based on measuring of the 3-phase reactive power output of the machines, and monitors the direction and magnitude of leading reactive power at the generator terminal. The protection algorithm is designed such that it can provide reliable protection against loss of field conditions and remains stable during recoverable power system swing conditions. While the new relay produces a trip signal for partial loss of field conditions causing the machine to lose its stability, it remains stable for the …


Study Of The Warranty Cost Model For Software Reliability With An Imperfect Debugging Phenomenon, D.R. Prince Williams Jan 2007

Study Of The Warranty Cost Model For Software Reliability With An Imperfect Debugging Phenomenon, D.R. Prince Williams

Turkish Journal of Electrical Engineering and Computer Sciences

Software reliability is one of the most important characteristics of software quality. Its measurement and management technologies employed during the software life-cycle are essential for producing and maintaining quality/reliable software systems. Herein, we discuss a modified approach to calculating the delivery cost of a software product, when warranty is to be provided, with an imperfect debugging phenomenon. Unlike existing cost models, here the strategy was to consider maintenance support given to the customer with an imperfect debugging phenomenon. The optimal release time can be calculated for various reliability levels by minimizing the cost. The delivery cost, reliability of the software …


Cs 891-01: Information Retrieval, Extraction, And Management, Krishnaprasad Thirunarayan Jan 2007

Cs 891-01: Information Retrieval, Extraction, And Management, Krishnaprasad Thirunarayan

Computer Science & Engineering Syllabi

This course expects an advanced Ph.D. student to (i) review background material in the area of Information Retrieval, Extraction, and Management, and (ii) develop/deliver a presentation on a mutually acceptable topic.


Cs 790-01: Multimedia Coding And Communication (I), Yong Pei Jan 2007

Cs 790-01: Multimedia Coding And Communication (I), Yong Pei

Computer Science & Engineering Syllabi

No abstract provided.


Cs 790-02: Advanced Data Mining, Guozhu Dong Jan 2007

Cs 790-02: Advanced Data Mining, Guozhu Dong

Computer Science & Engineering Syllabi

In this course we will cover advanced topics in data mining. We will study some classic papers as well as some important recent papers, on different types of applications, in this fast evolving field. Topics include: sequence mining, text mining, graph mining, data warehouse/cube mining, micro-array gene expression mining, privacy w.r.t. data mining, sensor network mining, data stream mining, time series mining, web mining, etc. The aim is to prepare you for advanced data mining research and application development.


Cs 480/680-01: Comparative Programming Languages, Michael L. Raymer Jan 2007

Cs 480/680-01: Comparative Programming Languages, Michael L. Raymer

Computer Science & Engineering Syllabi

No abstract provided.


Cs 415-01: Social Implications Of Computing, Leo Finkelstein Jan 2007

Cs 415-01: Social Implications Of Computing, Leo Finkelstein

Computer Science & Engineering Syllabi

CS 415 is a communication skills course using as its subject matter current salient issues associated with the social implications of computing. In addition to the course text, you will need to use certain reading materials in the library and elsewhere, and you will be responsible for using concepts and theories provided in class lectures and discussions.


Cs 400/600-01: Data Structures And Software Design, Michael L. Raymer Jan 2007

Cs 400/600-01: Data Structures And Software Design, Michael L. Raymer

Computer Science & Engineering Syllabi

No abstract provided.


Cs 302-01: Client Server Databases, Karen Meyer Jan 2007

Cs 302-01: Client Server Databases, Karen Meyer

Computer Science & Engineering Syllabi

No abstract provided.


Cs 241-01: Introduction To Computer Science Ii, Mateen M. Rizki Jan 2007

Cs 241-01: Introduction To Computer Science Ii, Mateen M. Rizki

Computer Science & Engineering Syllabi

No abstract provided.


Cs 240-01: Computer Science I, L. Jane Lin Jan 2007

Cs 240-01: Computer Science I, L. Jane Lin

Computer Science & Engineering Syllabi

No abstract provided.


Cs 214-01: Visual Basic Programming, Michael Ondrasek Jan 2007

Cs 214-01: Visual Basic Programming, Michael Ondrasek

Computer Science & Engineering Syllabi

This course provides a general introduction to the fundamentals of object computer programming. Examples from and applications to a broad range of problems are given. No prior knowledge of programming is assumed. However, students should have a familiarity with programming concepts. The concepts covered will be applied in the Visual Basic programming language. 4 credit hours.


Cs 208-01: Computer Programming For Business I, Dennis Kellermeier Jan 2007

Cs 208-01: Computer Programming For Business I, Dennis Kellermeier

Computer Science & Engineering Syllabi

CS 208 is the first of a two quarter sequence in programming for business students. It is required for Management Information Science majors. The courses are designed to help students achieve a high degree of facility in intermediate level programming. This course assumes students have never written a program before.


Cs 205-01: Introduction To Computers And Office Productivity Software, Kim Gros Jan 2007

Cs 205-01: Introduction To Computers And Office Productivity Software, Kim Gros

Computer Science & Engineering Syllabi

Focus on learning MS Office software applications including word processing (intermediate), spreadsheet database and presentation graphics using a case study approach where critical thinking and problem solving skills are required. Computer concepts are integrated throughout the course to provide an understanding of the basics of computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.


Cs 206-01: Advanced Concepts/Techniques And Software Productivity Tools, John P. Herzog Jan 2007

Cs 206-01: Advanced Concepts/Techniques And Software Productivity Tools, John P. Herzog

Computer Science & Engineering Syllabi

By the end of this course, the students will have a greater depth of understanding in the areas of word processing, spreadsheets, databases, and presentation software and web design using Microsoft Word, Microsoft FrontPage, Microsoft Excel, Access, and PowerPoint covering the following topics.
Microsoft Word 2003:
Tutorial 5: Creating Styles, Outlines, Tables, and Tables of Contents

Tutorial 6: Creating Form Letters and Mailing Labels

Microsoft Excel 2003:
Tutorial 5: Working with Excel Lists

Tutorial 6: Working with Multiple Worksheets and Workbooks

Tutorial 7: Working with Excel's Editing and Web Tools

Tutorial 8: Developing an Excel Application Appendix A: Working with …


Ceg 416-01: Matrix Computations, Ronald F. Taylor Jan 2007

Ceg 416-01: Matrix Computations, Ronald F. Taylor

Computer Science & Engineering Syllabi

This course is a survey of numerical methods in linear algebra for application to problems in engineering and the sciences. Emphasis is on using modem software tools on high performance computing systems. This course covers the mathematics of linear equations, eigenvalue problems, singular value decomposition, and least squares. Material covered will be relevant to applications areas such as structural analysis, heat transfer, neural networks, mechanical vibrations, and image processing in biomedical engineering. A familiarity with MATLAB is useful, and the ability to program in languages such as CIC++ or Fortran is very important. A basic knowledge of matrix algebra is …


Ceg 260-01: Digital Computer Hardware, Sridhar Ramachandran Jan 2007

Ceg 260-01: Digital Computer Hardware, Sridhar Ramachandran

Computer Science & Engineering Syllabi

Digital Computer Hardware. Topics include switching algebra and switching functions, logic design of combinational and sequential circuits using TTL, combinational logic design with MSI and LSI, busing, storage elements, and instrumentation. 3 hours lecture, 2 hours lab. Prerequisite: CS 241.


Ceg 726-01: Pattern Recognition, Arthur A. Goshtasby Jan 2007

Ceg 726-01: Pattern Recognition, Arthur A. Goshtasby

Computer Science & Engineering Syllabi

No abstract provided.


Ceg 498-01: Design Experience, Thomas C. Hartrum Jan 2007

Ceg 498-01: Design Experience, Thomas C. Hartrum

Computer Science & Engineering Syllabi

CEG 498 (Design Experience) is a summative computer engineering design project course that builds upon previous engineering, science, mathematics and communications course work. CEG 498 projects are a minimum of two quarters in length and must be completed in groups of at least three students. Projects are selected under the guidance of the course instructor and are tailored to both student interest and formal classroom preparation. Students are evaluated both on their individual contributions as recorded in a graded engineering journals and on the quality of their collective efforts as reflected in group generated products.


Ceg 477/677-01: Computer Graphics Ii, John A. Reisner Jan 2007

Ceg 477/677-01: Computer Graphics Ii, John A. Reisner

Computer Science & Engineering Syllabi

No abstract provided.


Ceg 435/635-01: Distributed Computing And Systems, Yong Pei Jan 2007

Ceg 435/635-01: Distributed Computing And Systems, Yong Pei

Computer Science & Engineering Syllabi

Study of process coordination, client-server computing, network and distributed operating systems, network and distributed file systems, concurrency control, recovery of distributed transactions, and fault-tolerant computing.


Ceg 210-01: Pc Networking I, Karen Meyer Jan 2007

Ceg 210-01: Pc Networking I, Karen Meyer

Computer Science & Engineering Syllabi

Introduction to PC networking hardware, concepts, and technologies. Focus is on LAN administration, hardware and software configuration.


Personal Information Management. A Framework For Development Of Personalisable Web Based Services, Christopher Fuchs Jan 2007

Personal Information Management. A Framework For Development Of Personalisable Web Based Services, Christopher Fuchs

Theses

The thesis research proposed herein will model, analyse and implement strategies for the development of personalised services. The goal of the research work is to design and implement a framework which supports developers by minimising the effort required in implementing personalised services. This includes the ability to react to localisation changes and to present proper information. An overall design goal is the independency of most components from each other which will be attained through the use of standard technologies and protocols and the consistent use of a component model. The result will include the proposed framework and the analyses of …


Real-Time Query Scheduling For Wireless Sensor Networks, Octav Chipara, Chenyang Lu, Gruia-Catalin Roman Jan 2007

Real-Time Query Scheduling For Wireless Sensor Networks, Octav Chipara, Chenyang Lu, Gruia-Catalin Roman

All Computer Science and Engineering Research

Recent years have seen the emergence of wireless sensor network (WSN) systems that require high data rate real-time communication. This paper proposes Real-Time Query Scheduling (RTQS), a novel approach to conflict-free transmission scheduling for real-time queries in WSNs. We show that there is an inherent trade-off between prioritization and throughput in conflict-free query scheduling. RTQS provides three new real-time scheduling algorithms. The non-preemptive query scheduling algorithm achieves high throughput while introducing priority inversions. The preemptive query scheduling algorithm eliminates priority inversion at the cost of reduced throughput. The slack stealing query scheduling algorithm combines the benefits of preemptive and non-preemptive …


Mlds: A Flexible Location Directory Service For Tiered Sensor Networks, Sangeeta Bhattacharya, Chien-Liang Fok, Chenyang Lu, Gruia-Catalin Roman Jan 2007

Mlds: A Flexible Location Directory Service For Tiered Sensor Networks, Sangeeta Bhattacharya, Chien-Liang Fok, Chenyang Lu, Gruia-Catalin Roman

All Computer Science and Engineering Research

Many emergent distributed sensing applications need to keep track of mobile entities across multiple sensor networks connected via an IP network. To simplify the realization of such applications, we present MLDS, a Multi-resolution Location Directory Service for tiered sensor networks. MLDS provides a rich set of spatial query services ranging from simple queries about entity location, to complex nearest neighbor queries. Furthermore, MLDS supports multiple query granularities which allow an application to achieve the desired tradeoff between query accuracy and communication cost. We implemented MLDS on Agimone, a unified middleware for sensor and IP networks. We then deployed and evaluated …