Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Entire DC Network

Best Practices Of Consuming Linked Open Data, Arbër Beshiri, Joana Mita, Anja Vangieli Nov 2014

Best Practices Of Consuming Linked Open Data, Arbër Beshiri, Joana Mita, Anja Vangieli

UBT International Conference

The term Linked Data is defined as a set of best practices for publishing and interlinking structured data on the web. These best practices were introduced by Tim Berners-Lee and are also known as principles. These best practices are used by the vast majority of data providers leading to the establishment of a global data space known as the web of data. In this paper will analyze and explore the technical principles of Linked Data, the best practices of using Linked Data, some deployed Linked Data applications and use cases to exploit the Web of Data.


Authentication In Saas By Implementing Double Security Measures, Muhamet Gërvalla, Shkëlqim Berisha Nov 2014

Authentication In Saas By Implementing Double Security Measures, Muhamet Gërvalla, Shkëlqim Berisha

UBT International Conference

Growing trends of services offered in the field of Cloud Computing are increasing on daily basis. These services are divided into three models: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Despite this, much interest is shown to the usage of Software as a Service (SaaS) model. This model offers the usage of software’s that are hosted in Cloud that can be accessed by using web browsers or through “thin client”. Security and privacy are two most important problems that can occur in this model. Authentication through password is one of the …


Concept Of Online Assisted Platform For Technologies And Management In Communications – Optimek, Galia Marinova, Vassil Guliashki, Ognyan Chikov Nov 2014

Concept Of Online Assisted Platform For Technologies And Management In Communications – Optimek, Galia Marinova, Vassil Guliashki, Ognyan Chikov

UBT International Conference

The paper describes the concept of a Multimodular Multydisciplinary platform, contacting through unified templates in a Portal with knowledge, with Useful INTERNET resources, in order to provide advanced research and education. Usually the online resources available are mainly in the area of e- and distance education, but still an understanding is missing for the scale and the use of studying and the systematization of the online resource. The new concept has an accent of the useful INTERNET resource and the development of a System of nets to it, in the aim of solving tasks and generating new knowledge in the …


The Impacts Of Cloud Computing And Big Data Applications On Developing World-Based Smallholder Farmers, Nir Kshetri Nov 2014

The Impacts Of Cloud Computing And Big Data Applications On Developing World-Based Smallholder Farmers, Nir Kshetri

UBT International Conference

Cloud computing and big data applications are likely to have far-reaching and profound impacts on developing world-based smallholder farmers. Especially, the use of mobile devices to access cloud-based applications is a promising approach to deliver value to smallholder farmers in developing countries since according to the International Telecommunication Union, mobile-cellular penetration in developing countries is expected to reach 90% by the end of 2014. This article examines the contexts, mechanisms, processes and consequences associated with cloud computing and big data deployments in farming activities that could affect the lives of developing world-based smallholder farmers. We analyze the roles of big …


Theoretical Analysis Of Dynamic General Equilibrium Model, Mimi Kodheli, Arjeta Vokshi Nov 2014

Theoretical Analysis Of Dynamic General Equilibrium Model, Mimi Kodheli, Arjeta Vokshi

UBT International Conference

Central Bank is one of the most important institutions of a country because its responsibility is to draw and implement the monetary policy. The central bank, in order to accomplish this responsibility, has to have a clearly defined main objective, the instruments that will use to achieve the objective, and it should be able to make precise or very good forecasts of macroeconomic variables. In order to make these forecasts, the central bank should first of all understand every monetary transmission mechanism and determine the most effective one. The success or non-success of monetary policy, living apart the other factors, …


Efficient Algorithm For Solving 3sum Problem, Muhamed Retkoceri Nov 2014

Efficient Algorithm For Solving 3sum Problem, Muhamed Retkoceri

UBT International Conference

In this paper is presented an algorithm for solving 3SUM problem efficiently in general computation model. The algorithm is based on sorting and splits the task into sub-tasks where this approach enables the algorithm to run concurrently at the high-level of computing. The algorithm is O(n2) and running sequentially achieves at least ~1/5 n2 number of basic necessary accesses of data structures. In this paper is also presented a comparison of running performances in practice between the new algorithm and the current most famous algorithm for 3SUM which is in-place and also based on sorting.


Using Congruence In Encoding Musical Partituras, Besim Shala, Besiana Mehmedi, Shkodran Tolaj, Azir Jusufi Nov 2014

Using Congruence In Encoding Musical Partituras, Besim Shala, Besiana Mehmedi, Shkodran Tolaj, Azir Jusufi

UBT International Conference

Along with theoretical review of partituras and encryption systems, we have tried to conduct encryption of sheets by encoding all of its elements such as: encoding musical notes, encoding values of notes and intermissions, encoding accords, encoding tonalities and encoding rhythm whereby the original musical piece is transformed into an irregular and meaningless sheet. Information technology today has allowed for easier copying of authorial pieces; therefore, it is necessary to know encryption which allows protection of pieces from any misuse. Cryptology including knowledge of congruence deals with resolution of these insecurities. The significance of this paper lies in intertwining knowledge …


It, E-Commerce, Individual And Team Learning Environment, Besnik Skenderi, Diamanta Skenderi Nov 2014

It, E-Commerce, Individual And Team Learning Environment, Besnik Skenderi, Diamanta Skenderi

UBT International Conference

This paper is about impact of Information Technology on creating learning environment and on e-commerce. Because of innovations on the field of IT, individuals and businesses are affected; however with those changes also need for capacity building and long life learning is appearing. In addition, companies and markets can not be considered as a static concept, but they are changing and evolving every day. Those changes are also brining innovations in management procedures and in production of goods and services. Implementation of e-commerce is trigering also the implementation of other e-tools that can help companies to manage in better way …


On The Role Of Gis Technology In Geospatial Education (Qgis Vs Argis), Shkelqim Kuka, Jozef Bushati Nov 2014

On The Role Of Gis Technology In Geospatial Education (Qgis Vs Argis), Shkelqim Kuka, Jozef Bushati

UBT International Conference

In the teaching of modeling concepts and spatial analysis, a major role play technologies and software. Anyhow main aim at the education is the teaching of concept independently on what kind of technologies and software will be used. The latter might be grouped in two categories: the commercial software and Open Source software. In this article emphasises the role of GIS technologies at the process of teaching and it is fulfilled an analysis advantages adn disadvantages between both software: commercial software ArcGis, and so called “Open Source” QuantumGis. Taking in to consideration the financial possibility of the educational institutions and …


Improved Microrobotic Control Through Image Processing And Automated Hardware Interfacing, Archit R. Aggarwal, Wuming Jing, David J. Cappelleri Aug 2014

Improved Microrobotic Control Through Image Processing And Automated Hardware Interfacing, Archit R. Aggarwal, Wuming Jing, David J. Cappelleri

The Summer Undergraduate Research Fellowship (SURF) Symposium

Untethered submilliliter-sized robots (microrobots) are showing potential use in different industrial, manufacturing and medical applications. A particular type of these microrobots, magnetic robots, have shown improved performance in power and control capabilities compared to the other thermal and electrostatic based robots. However, the magnetic robot designs have not been assessed in a robust manner to understand the degree of control in different environments and their application feasibility. This research project seeks to develop a custom control software interface to provide a holistic tool for researchers to evaluate the microrobotic performance through advance control features. The software deliverable involved two main …


Granular Matter: Microstructural Evolution And Mechanical Response, Aashish Ghimire, Ishan Srivastava, Timothy S. Fisher Aug 2014

Granular Matter: Microstructural Evolution And Mechanical Response, Aashish Ghimire, Ishan Srivastava, Timothy S. Fisher

The Summer Undergraduate Research Fellowship (SURF) Symposium

Heterogeneous (nano) composites, manufactured by the densification of variously sized grains, represent an important and ubiquitous class of technologically relevant materials. Typical grain sizes in such materials range from macroscopic to a few nanometers. The morphology exhibited by such disordered materials is complex and intricately connected with its thermal and electrical transport properties. It is important to quantify the geometric features of these materials and simulate the fabrication process. Additionally, granular materials exhibit complex structural and mechanical properties that crucially govern their reliability during industrial use. In this work, we simulate the densification of soft deformable grains from a low-density …


Libraries Respond To Mobile Ubiquity: Research And Assessment Of Mobile Device Usage Trends For Academic And Medical Libraries, Megan M. Hurst, Eleanor I. Cook, J. Michael Lindsay, Martha F. Earl Jun 2014

Libraries Respond To Mobile Ubiquity: Research And Assessment Of Mobile Device Usage Trends For Academic And Medical Libraries, Megan M. Hurst, Eleanor I. Cook, J. Michael Lindsay, Martha F. Earl

Charleston Library Conference

The authors consider trends in mobile device usage for the Internet as a whole, for EBSCO Discovery Service across all client libraries, and at two specific libraries: Preston Medical Library, serving the University of Tennessee (UT) Graduate School of Medicine and UT Medical Center, and the Joyner Library at East Carolina University, serving students and faculty on the main campus. Librarians at Preston Medical Library conducted a survey to determine which mobile devices, platforms, and apps were used by their patrons in 2012. East Carolina University piloted an iPad and e-reader lending program in 2010–2011. The results of each are …


Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague May 2014

Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague

Annual ADFSL Conference on Digital Forensics, Security and Law

Email is the most common and comparatively the most efficient means of exchanging information in today's world. However, given the widespread use of emails in all sectors, they have been the target of spammers since the beginning. Filtering spam emails has now led to critical actions such as forensic activities based on mining spam email. The data mine for spam emails at the University of Alabama at Birmingham is considered to be one of the most prominent resources for mining and identifying spam sources. It is a widely researched repository used by researchers from different global organizations. The usual process …


Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen May 2014

Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen

Annual ADFSL Conference on Digital Forensics, Security and Law

There has been extensive work in crime scene reconstruction of physical locations, and much is known in terms of digital forensics of computing devices. However, the network has remained a nebulous combination of entities that are largely ignored during an investigation due to the transient nature of the data that flows through the networks. This paper introduces an architecture for network path reconstruction using the network layer reachability information shared via OSPF Link State Advertisements and the routines and functions of OSPF::rt_sched() as applied to the construction of identical Link State Databases for all routers within an Area.


Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt May 2014

Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt

Annual ADFSL Conference on Digital Forensics, Security and Law

As cybercrime continues to increase, new cyber forensics techniques are needed to combat the constant challenge of Internet anonymity. In instant messaging (IM) communications, criminals use virtual identities to hide their true identity, which hinders social accountability and facilitates cybercrime. Current instant messaging products are not addressing the anonymity and ease of impersonation over instant messaging. It is necessary to have IM cyber forensics techniques to assist in identifying cyber criminals as part of the criminal investigation. Instant messaging behavioral biometrics include online writing habits, which may be used to create an author writeprint to assist in identifying an author …


Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack May 2014

Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack

Annual ADFSL Conference on Digital Forensics, Security and Law

Botnets are responsible for a large percentage of damages and criminal activity on the Internet. They have shifted attacks from push activities to pull techniques for the distribution of malwares and continue to provide economic advantages to the exploiters at the expense of other legitimate Internet service users. In our research we asked; what is the cost of the procedural steps for forensically investigating a Botnet attack? The research method applies investigation guidelines provided by other researchers and evaluates these guidelines in terms of the cost to a digital forensic investigator. We conclude that investigation of Botnet attacks is both …


Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang May 2014

Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang

Annual ADFSL Conference on Digital Forensics, Security and Law

The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively …


Computer Forensics For Accountants, Grover S. Kearns May 2014

Computer Forensics For Accountants, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …


Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter May 2014

Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Existing digital forensic investigation process models have provided guidelines for identifying and preserving potential digital evidence captured from a crime scene. However, for any of the digital forensic investigation process models developed across the world to be adopted and fully applied by the scientific community, it has to be tested. For this reason, the Harmonized Digital Forensic Investigation Process (HDFIP) model, currently a working draft towards becoming an international standard for digital forensic investigations (ISO/IEC 27043), needs to be tested.

This paper, therefore, presents the findings of a case study used to test the HDFIP model implemented in the ISO/IEC …


Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson May 2014

Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson

Annual ADFSL Conference on Digital Forensics, Security and Law

During the present age and time, it seems as though people in society have become addicted to nearly anything and everything, whether it be to a substance, an activity or an object. The Internet and pornography is no exception. While commonly thought of as a deviant behavior, many are displaying addictions towards the Internet and pornography. More alarming, however, are those who are viewing, downloading, or trading child pornography and displaying addictive Internet behaviors, for they are spending excessive amounts of time engaging in the proliferation of child pornographic materials. For this reason, addiction to the Internet and usage of …


Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar May 2014

Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …


Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore May 2014

Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence …


03. Biology, University Of Central Oklahoma Jan 2014

03. Biology, University Of Central Oklahoma

Oklahoma Research Day Abstracts

No abstract provided.