Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Using Triz To Design The Future Keyboard, Umakant Mishra Feb 2006

Using Triz To Design The Future Keyboard, Umakant Mishra

Umakant Mishra

A keyboard is the most common and widely used input device for a computer. Using the keyboard is often vital to interact with a computer. There are several aspects of a keyboard such as size, key layout, convenience and ergonomic features etc., which are continuously under improvement by keyboard designers and manufacturers. TRIZ is an efficient methodology in product designing. Using IFR and Trends we can well predict the directions of the future keyboards and using Contradictions and Principles we can overcome the current limitations. This article analyses the critical features of a keyboard, does a functional analysis, derives the …


An Overview Of Mac Protocols With Directional Antennas In Wireless Ad Hoc Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2005

An Overview Of Mac Protocols With Directional Antennas In Wireless Ad Hoc Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

Although directional antennas have been used in mobile communications systems for quite a long time, realistic applications of directional or smart antennas in wireless ad hoc network have emerged just in recent years. Directional antennas provide numerous benefits, such as higher gains, increased transmission range and low interferences. Wireless medium access schemes play a crucial role in ensuring the efficient and fair sharing of wireless resources. Therefore there are many research work on mechanisms at the wireless medium access layer by using directional antennas. The new features of MAC with directional antennas can cause not only location dependent carrier sensing …


Mac Os X Forensics, Philip Craiger, Paul Burke Dec 2005

Mac Os X Forensics, Philip Craiger, Paul Burke

J. Philip Craiger, Ph.D.

This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.


Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger Dec 2005

Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger

J. Philip Craiger, Ph.D.

Secure deletion programs purport to permanently erase files from digital media. These programs are used by businesses and individuals to remove sensitive information from media, and by criminals to remove evidence of the tools or fruits of illegal activities. This paper focuses on the trace evidence left by secure deletion programs. In particular, five Windows-based secure deletion programs are tested to determine if they leave identifiable signatures after deleting a file. The results show that the majority of the programs leave identifiable signatures. Moreover, some of the programs do not completely erase file metadata, which enables forensic investigators to extract …