Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 95

Full-Text Articles in Engineering

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley Jan 2010

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley

Journal of Digital Forensics, Security and Law

The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task …


Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz Jan 2010

Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz

Journal of Digital Forensics, Security and Law

Based on existing software aimed at investigation support in the analysis of computer data storage seized during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.


Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay Jan 2010

Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay

Journal of Digital Forensics, Security and Law

The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed in the …


Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns Jan 2010

Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …


Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki Jan 2010

Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki

Journal of Digital Forensics, Security and Law

These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …


Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli Jan 2010

Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli

Journal of Digital Forensics, Security and Law

30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …


Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky Jan 2010

Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky

Journal of Digital Forensics, Security and Law

This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …


Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler Jan 2010

Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler

Journal of Digital Forensics, Security and Law

On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won't …


Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum Jan 2010

Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …


Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington Jan 2010

Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington

Journal of Digital Forensics, Security and Law

Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard …


Trust Account Fraud And Effective Information Security Management, Sameera Mubarak Jan 2010

Trust Account Fraud And Effective Information Security Management, Sameera Mubarak

Journal of Digital Forensics, Security and Law

The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …


Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward Jan 2010

Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward

Journal of Digital Forensics, Security and Law

Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …


The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies Jan 2010

The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies

Journal of Digital Forensics, Security and Law

The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …


Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma Jan 2010

Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma

Journal of Digital Forensics, Security and Law

The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers involved. …


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Remote Sensing Applications Of Hf Skywave Radar: The Australian Experience, Stuart Anderson Jan 2010

Remote Sensing Applications Of Hf Skywave Radar: The Australian Experience, Stuart Anderson

Turkish Journal of Electrical Engineering and Computer Sciences

Australia has conducted research into over-the-horizon radar (OTHR) for almost sixty years. Early programs focused exclusively on military capabilities, such as the detection of aircraft, missiles and ships, but in 1974 a team was formed to design a new OTHR for which a remote sensing mission was proposed. Oceanic wind mapping experiments in 1977-78 yielded promising results so remote sensing became a recognised mission assigned to the new radar, known as Jindalee Stage B. This capability was progressively expanded over the period 1982-87 to include mapping of wave height and other oceanographic variables. A real-time data link to the Australian …


Improved Analytical Modulation Transfer Function For Image Intensified Charge Coupled Devices*, Nebi̇ Gül, Murat Efe Jan 2010

Improved Analytical Modulation Transfer Function For Image Intensified Charge Coupled Devices*, Nebi̇ Gül, Murat Efe

Turkish Journal of Electrical Engineering and Computer Sciences

The basic problem of simulation and modeling of Image Intensified Charge Coupled Device (ICCD) is the difference between the analytical Modulation Transfer Function (MTF) formulation used in the model and the experimentally obtained MTF. An investigation into the MTF of ICCD sub-components reveal that the MTF of the Image Intensifier Tube (IIT) is the main factor in this deviation. In this study, a regulation factor for the MTF of 3^{rd} generation IITs has been developed. A commonly used MTF formulation for IITs has been modified to include a regulation factor which has helped produce more precise MTF values for the …


P2p Collaborative Filtering With Privacy, Ci̇han Kaleli̇, Hüseyi̇n Polat Jan 2010

P2p Collaborative Filtering With Privacy, Ci̇han Kaleli̇, Hüseyi̇n Polat

Turkish Journal of Electrical Engineering and Computer Sciences

With the evolution of the Internet and e-commerce, collaborative filtering (CF) and privacy-preserving collaborative filtering (PPCF) have become popular. The goal in CF is to generate predictions with decent accuracy, efficiently. The main issue in PPCF, however, is achieving such a goal while preserving users' privacy. Many implementations of CF and PPCF techniques proposed so far are centralized. In centralized systems, data is collected and stored by a central server for CF purposes. Centralized storage poses several hazards to users because the central server controls users' data. In this work, we investigate how to produce naïve Bayesian classifier (NBC)-based recommendations …


Dual-Use Of Compact Hf Radars For The Detection Of Mid- And Large-Size Vessels, Hugh Roarty, Don Barrick, Josh Kohut, Scott Glenn Jan 2010

Dual-Use Of Compact Hf Radars For The Detection Of Mid- And Large-Size Vessels, Hugh Roarty, Don Barrick, Josh Kohut, Scott Glenn

Turkish Journal of Electrical Engineering and Computer Sciences

This paper describes the development of the SeaSonde High Frequency Radar system into a dual-use application for the mapping of ocean surface currents and detection of ships at sea. This development entailed the creation of a new radar waveform that would permit this dual-use as well as a detection algorithm to identify the ships in the radar spectra. The detection algorithm utilizes two methods for calculating a background signal level: an infinite impulse response (IIR) filter and a two-dimensional median filter. These two methods are employed simultaneously with multiple length averaging times to maximize the number of detections. The initial …


Antenna Systems With Beam Forming And Beam Steering Capabilities For Hf Skywave Radars, Çağatay Uluişik Jan 2010

Antenna Systems With Beam Forming And Beam Steering Capabilities For Hf Skywave Radars, Çağatay Uluişik

Turkish Journal of Electrical Engineering and Computer Sciences

Radiation characteristics of linearly phased, periodic, planar dipole arrays, which can be used as transmitting/receiving antenna systems for HF skywave radars, are investigated. Rectangular, triangular and trapezoidal arrays are proposed in obtaining different beam shapes in the desired directions. Beam steering is achieved by adjusting the inter-element phase increments coherently. The effects of vertical array-tilt with a desired take-off angle (TOA) \alpha are presented by a number of radiation pattern examples. The ground effect is investigated using the image theory by assuming the Earth's surface as perfectly electric conductor (PEC). Radiated fields are obtained using Floquet wave representations plus the …


Hierarchical Fuzzy Controller Applied To Multi-Input Power System Stabilizer, Ebrahim Rasooli Anarmarzi, Mohammad Reza Feyzi, Mehrdad Tarafdar Hagh Jan 2010

Hierarchical Fuzzy Controller Applied To Multi-Input Power System Stabilizer, Ebrahim Rasooli Anarmarzi, Mohammad Reza Feyzi, Mehrdad Tarafdar Hagh

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes the application of a hierarchical fuzzy system (HFS) based on multi-input power system stabilizer (MPSS) in multi-machine environment. The number of rules increases exponentially with the number of variables in a standard fuzzy system. This problem is solved in the proposed HFS method. In this method, the total number of rules increases only linearly with the number of input variables. HFS consists of a number of low-dimensional fuzzy systems in a hierarchical form. In the MPSS, the deviation of reactive power \Delta Q is added to a \Delta P+ \Delta \omega input type Power System Stabilizer (PSS) …


Washout Filter Based Control For The Hodgkin-Huxley Nerve Cell Dynamics, Reşat Özgür Doruk Jan 2010

Washout Filter Based Control For The Hodgkin-Huxley Nerve Cell Dynamics, Reşat Özgür Doruk

Turkish Journal of Electrical Engineering and Computer Sciences

In this work we present a washout filter based control approach for stabilizing the oscillations in Hodgkin-Huxley type neurons. The oscillations occur due to the bifurcations that arise from the potassium and sodium channel conductance deviations. The MATCONT toolbox software environment was used for analysis of the bifurcation points in conjunction with MATLAB. The simulations of the Hodgkin-Huxley (HH) model at those points are provided to validate the results obtained from the MATCONT software. Then a washout filter is proposed to stabilize the oscillations occur at the Hopf bifurcation points where the external current injection is used to provide the …


Active Illumination And Appearance Model For Face Alignment, Muhi̇tti̇n Gökmen, Fati̇h Kahraman, Sune Darkner, Rasmus Larsen Jan 2010

Active Illumination And Appearance Model For Face Alignment, Muhi̇tti̇n Gökmen, Fati̇h Kahraman, Sune Darkner, Rasmus Larsen

Turkish Journal of Electrical Engineering and Computer Sciences

Illumination conditions have an explicit effect on the performance of face recognition systems. In particular, varying the illumination upon the face imposes such complex effects that the identification often fails to provide a stable performance level. In this paper, we propose an approach integrating face identity and illumination models in order to reach acceptable and stable face recognition rates. For this purpose, Active Appearance Model (AAM) and illumination model of faces are combined in order to obtain an illumination invariant face localization. The proposed method is an integrated Active Illumination and Appearance Model (AIA) which combines identity, illumination and shape …


Sdre Optimal Control Of Drug Administration In Cancer Treatment, Mehmet İti̇k, Meti̇n Uymaz Salamci̇, Stephen Paul Banks Jan 2010

Sdre Optimal Control Of Drug Administration In Cancer Treatment, Mehmet İti̇k, Meti̇n Uymaz Salamci̇, Stephen Paul Banks

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, we apply State Dependent Riccati Equation (SDRE) based optimal control technique to a nonlinear tumor growth model. The model consists of three biological cells which are normal tissue, tumor and immune cells. The effect of chemotherapy treatment is also included in the model. Chemotherapy administration is considered as a control input to the nonlinear cancer dynamics and the amount of administered drug is determined by using SDRE optimal control. The optimal control is applied to the model in order not only to drive the tumor cells to the healthy equilibrium state but also to minimize the amount …


Analysis And Estimation Of Motion Transmission Errors Of A Timing Belt Drive, Ergi̇n Kiliç, Meli̇k Dölen, Ahmet Buğra Koku Jan 2010

Analysis And Estimation Of Motion Transmission Errors Of A Timing Belt Drive, Ergi̇n Kiliç, Meli̇k Dölen, Ahmet Buğra Koku

Turkish Journal of Electrical Engineering and Computer Sciences

This paper focuses on viable position estimation schemes for timing belt drives where the position of the carriage (load) is to be determined via reference models receiving input from a position sensor attached to the actuator of the timing belt. A detailed analysis of the transmission error sources is presented, and a number of relevant mathematical models are developed using a priori knowledge of the process. This paper demonstrates that such schemes are very effective when the drive system is not subjected to external loads and operating conditions do not change considerably i.e. ambient temperature, belt tension.


Optimal Feature Selection For 3d Facial Expression Recognition Using Coarse-To-Fine Classification, Hamit Soyel, Hasan Demirel Jan 2010

Optimal Feature Selection For 3d Facial Expression Recognition Using Coarse-To-Fine Classification, Hamit Soyel, Hasan Demirel

Turkish Journal of Electrical Engineering and Computer Sciences

Automatic facial expression recognition for novel individuals from 3D face data is a challenging task in pattern analysis. This paper describes a feature selection process for pose-invariant 3D facial expression recognition. The process provides a lower dimensional subspace representation, which is optimized to improve the classification accuracy, retrieved from geometrical localization of facial feature points to classify facial expressions. Fisher criterion-based approach is adopted to provide a basis for the optimal selection of features. Two-stage probabilistic neural network architecture is employed as a classifier to recognize the facial expressions. In the first stage, which can be regarded as the coarse …


A Second Order Approximation To Reduce The Complexity Of Ldpc Decoders Based On Gallager's Approach, Aykut Kalaycioğlu, Oktay Üreten, H. Gökhan İlk Jan 2010

A Second Order Approximation To Reduce The Complexity Of Ldpc Decoders Based On Gallager's Approach, Aykut Kalaycioğlu, Oktay Üreten, H. Gökhan İlk

Turkish Journal of Electrical Engineering and Computer Sciences

A piece-wise second order approximation to the f (x) = -log [tanh (x/2)] function is proposed to reduce the computational complexity of LDPC decoder's utilizing Log-Likelihood Ratio Belief Propagation (LLR-BP) algorithm based on Gallager's approach. Simulation results show that the proposed low complexity approximation doesn't cause BER performance degradation.


Adaptive Neuro-Fuzzy Inference System To Improve The Power Quality Of Variable-Speed Wind Power Generation System, Yüksel Oğuz, Kami̇l Ri̇fat İrfan Güney Jan 2010

Adaptive Neuro-Fuzzy Inference System To Improve The Power Quality Of Variable-Speed Wind Power Generation System, Yüksel Oğuz, Kami̇l Ri̇fat İrfan Güney

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, an adaptive neuro-fuzzy inference system is designed for output voltage and frequency control of a variable-speed wind power generation system. Variable-speed wind power generation systems (VSWPGS) provide the opportunity to capture more power than fixed speed turbines. On the other hand, the variable-speed wind turbine output can be variable voltage and variable frequency for fluctuating wind speeds. The quality of output power can be improved if adequate controls are incorporated in the system. To bring the output voltage and frequency of system by means of control of blade pitch angle of wind turbine to a desirable value, …


Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum Jan 2010

Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to send more spam. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the IP addresses over a period of time. The results show that many …