Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (31)
- Computer Engineering (21)
- Computer Sciences (19)
- Electrical and Computer Engineering (12)
- Information Security (12)
-
- Computer Law (11)
- Forensic Science and Technology (11)
- Law (11)
- Legal Studies (11)
- Social and Behavioral Sciences (11)
- Life Sciences (10)
- Digital Communications and Networking (9)
- OS and Networks (6)
- Business (3)
- Technology and Innovation (3)
- Aerodynamics and Fluid Mechanics (1)
- Aerospace Engineering (1)
- Applied Mathematics (1)
- Data Science (1)
- Databases and Information Systems (1)
- Dynamic Systems (1)
- Education (1)
- Graphics and Human Computer Interfaces (1)
- Hardware Systems (1)
- Materials Science and Engineering (1)
- Ordinary Differential Equations and Applied Dynamics (1)
- Physics (1)
- Power and Energy (1)
- Semiconductor and Optical Materials (1)
- Institution
- Keyword
-
- Bandwidth (3)
- Data mining (2)
- Routing protocols (2)
- System testing (2)
- AFDMA (1)
-
- Arch ware tool (1)
- Artificial neural networks (1)
- Backpropagation algorithms (1)
- Channel capacity (1)
- Circuit faults (1)
- Circuit testing (1)
- Clustering algorithms (1)
- Collaboration (1)
- Communication networks (1)
- Communication system control (1)
- Communication system traffic control (1)
- Computational fluid dynamics (1)
- Computer industry (1)
- Computer networks (1)
- Computer science (1)
- Costs (1)
- Crank-Nicolson method (1)
- Crosstalk (1)
- Data analysis (1)
- Decision making (1)
- Decoding (1)
- Delay (1)
- Disaster management (1)
- Education (1)
- Electrical fault detection (1)
Articles 1 - 30 of 34
Full-Text Articles in Engineering
Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar
Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar
International Conference on Information and Communication Technologies
Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …
Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali
Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali
International Conference on Information and Communication Technologies
Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …
Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood
Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood
International Conference on Information and Communication Technologies
In this paper we have analyzed and developed a formal specification of a trust model in semantic grid registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in pi-calculus. Finally we transformed the specification to pi- ADL and generated code using Archware tool. We have already developed a semantic grid registry.
Application Of Ict - I: Power Optimization Of Relay Channels, F Ahmed, Z Howard
Application Of Ict - I: Power Optimization Of Relay Channels, F Ahmed, Z Howard
International Conference on Information and Communication Technologies
Relaying in wireless communication can improve power and quality of service. Multiple nodes share channel resources to achieve optimized power. We consider a model with fixed source, destination and relay nodes. Our model finds the optimal values for power transmission for direct and relayed transmitting nodes. In our problem we compare amplify and forward and decode and forward transmission protocols. Unlike other researchers who use constant achievable rates as objective function and power as constraint, we use the strategy of minimizing relay and source power with achievable and target rates as constraints. We simulate various scenarios and our results indicate …
Application Of Ict - I: A Framework For Finding Minimal Test Vectors For Stuck-At-Faults, Azam Beg, S.K. Hasnain
Application Of Ict - I: A Framework For Finding Minimal Test Vectors For Stuck-At-Faults, Azam Beg, S.K. Hasnain
International Conference on Information and Communication Technologies
This paper presents a framework that utilizes Boolean difference theory to find test vectors for stuck-at-fault detection. The framework reads in structural-style Verilog models, and automatically injects single stuck-at-faults (either stuck-at-zero or stuck-at-one) into the models. The simulations are then performed to find minimal sets of test vectors. Using this setup, we conducted experiments on more than 4000 different circuits. The results show that an appreciable savings in test time and effort can be achieved using the method. The same setup can also be used for didactic purposes, specifically for digital design and test courses.
Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit
Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit
International Conference on Information and Communication Technologies
Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.
Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan
Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan
International Conference on Information and Communication Technologies
The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.
Networks - I: An Instantiation Of Way Point Routing For Mobile Ad Hoc Networks, Waseem M. Arain, Sayeed Ghani
Networks - I: An Instantiation Of Way Point Routing For Mobile Ad Hoc Networks, Waseem M. Arain, Sayeed Ghani
International Conference on Information and Communication Technologies
Mobile ad hoc networks are increasingly finding their existence in the marketplace heading to a new paradigm of pervasive computing. However there are many areas open to research in the field. Due to node mobility resulting in an ever-changing network topology, conventional routing methods cannot be applied in MANETS. Therefore, this is one of the core areas of research. Researchers are challenged to design protocols that can potentially scale to anything from thousand to tens of thousands of nodes and to reduce the route discovery latency. In this paper a different instantiation of way point routing (WPR) model is proposed, …
Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
International Conference on Information and Communication Technologies
New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data …
Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain
Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain
International Conference on Information and Communication Technologies
An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …
Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik
Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik
International Conference on Information and Communication Technologies
In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs very useful and promising. In our proposed model, the assessment criteria for different components of cooperative training and senior project are transformed into linguistic labels and evaluation information is extracted into the form of IF-THEN rules from the experts. These rules are modeled …
Efficient Simulation Of Fluid Flow, David Hannasch, Monika Neda
Efficient Simulation Of Fluid Flow, David Hannasch, Monika Neda
Undergraduate Research Opportunities Program (UROP)
We are computationally investigating fluid flow models for physically correct predictions of flow structures. Models based on the idea of filtering the small scales/structures and also the Navier-Stokes equations which are the fundamental equations of fluid flow, are numerically solved via the continuous finite element method. Crank-Nicolson and fractional-step theta scheme are used for the discretization of the time derivative, while the Taylor-Hood and Mini elements are used for the discretization is space. The effectiveness of these numerical discretizations in time and space are examined by studying the accuracy of fluid characteristics, such as drag, lift and pressure drop.
The Effects Of Pressure On Wide Bandgap Gan Semiconductors, William Kang, Linda Tran, Eunja Kim
The Effects Of Pressure On Wide Bandgap Gan Semiconductors, William Kang, Linda Tran, Eunja Kim
Undergraduate Research Opportunities Program (UROP)
Gallium nitride (GaN) is a group-III nitride semiconductor; which may prove useful in developing optical instruments that operate under high ambient pressures. The purpose of this project is to examine the properties of GaN under varying conditions. The methods used in this experiment consist of modeling free energy as a function of lattice constants; calculating bond lengths, bond strengths, and bulk moduli; and comparing the resultant data with values in published literature. We will also compare these results with experimental data drawn from x-ray diffraction scans. By doing so, we hope to determine whether gallium nitride is suitable for use …
Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill
Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill
Annual ADFSL Conference on Digital Forensics, Security and Law
The London 2012 Olympics is just three years away and the clock is ticking to put in place plans get it right. The potential for cybercrime to cause harm during this event is very great; harm to national reputation, harm to the reputation to the Olympic movement, and harm to individuals competing, watching or officiating. This paper considers the need to address these risks by taking a look at what has happened in the past at sporting events and the rising wave of electronic security threats and fraud facilitated by computers at recent Olympics. The problems for law enforcement are …
Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski
Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski
Annual ADFSL Conference on Digital Forensics, Security and Law
When investigators from either the private or public sector review digital data surrounding a case for evidentiary value, they typically conduct a systematic categorization process to identify the relevant digital devices. Armed with the proper methodology to accomplish this task, investigators can quickly recognize the appropriate digital devices for forensic processing and review. This paper purposes a methodology for investigating an individual’s online social networking persona.
Keywords: Social Networking, Web 2.0, Internet Investigations, Online Social Networking Community
Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler
Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.
Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking
Concerning File Slack, Stephen P. Larson
Concerning File Slack, Stephen P. Larson
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we discuss the phenomena known as file slack. File slack is created each time a file is created on a hard disk, and can contain private or confidential data. Unfortunately, the methods used by Microsoft Windows operating systems to organize and save files require file slack, and users have no control over what data is saved in file slack. This document will help create awareness about the security issue of file slack and discuss research results concerning file slack.
Keywords : Computer Forensics, File Slack, Ram Slack, Disk Slack
The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma
The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma
Annual ADFSL Conference on Digital Forensics, Security and Law
One of the most unanticipated results of the Computer Fraud and Abuse Act arose from the law of unintended consequences. The CFAA was originally enacted in 1984 to protect federal government computers from intrusions and damage caused by hackers, identity thieves, and other cyber criminals. The law was later amended to extend the scope of its application to financial institutions’, business’s and consumers’ computers. To aid in the pursuit of cyber criminals, one of the subsequent revisions to the law included provision “G” that gave the right to private parties to seek compensation for damages in a civil action for …
Why Are We Not Getting Better At Data Disposal?, Andy Jones
Why Are We Not Getting Better At Data Disposal?, Andy Jones
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper describes two sets of research, the first of which has been carried out over a period of four years into the levels and types of information that can be found on computer hard disks that are offered for sale on the second hand market. The second research project examined a number of second-hand hand held devices including PDAs, mobile (cell) phones and RIM Blackberry devices. The primary purpose of this research was to gain an understanding of the reasons for the failure to effectively remove potentially sensitive information from the disks and handheld devices. Other objectives included determining …
Don’T Touch That! And Other E-Discovery Issues, Linda Volonino
Don’T Touch That! And Other E-Discovery Issues, Linda Volonino
Annual ADFSL Conference on Digital Forensics, Security and Law
The ability to preserve and access electronically stored information (ESI) took on greater urgency when amendments to the Federal Rules of Civil Procedure went into effect in December 2006. These amendments, referred to as the electronic discovery (e-discovery) amendments, focus on the discovery phase of civil litigation, audits, or investigations. Discovery is the investigative phase of a legal case when opponents learn what evidence is available and how accessible it is. When ESI is the subject of discovery, it is called e-discovery. Recognizing that most business and personal records and communications are electronic, Judge Shira A. Scheindlin stated, "We used …
Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi
Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi
Annual ADFSL Conference on Digital Forensics, Security and Law
The Windows Registry stores a wide variety of data representing a host of different user properties, settings and program information. The data structures used by the registry are designed to be adaptable to store these differences in a simple format. In this paper we will highlight the existence of a rare data structure that is used to store a large amount of data within the registry hives. We analyse the manner in which this data structure stores its data and the implications that it may have on evidence retrieval and digital investigation. In particular, we reveal that the three of …
Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi
Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi
Annual ADFSL Conference on Digital Forensics, Security and Law
Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We …
Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns
Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns
Annual ADFSL Conference on Digital Forensics, Security and Law
Forensics and information technology (IT) have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting that includes instruction in forensics and information technology. When students do not view the IT topics as being equally important to their careers as traditional accounting topics, these attitudes may reduce the quality of the course. In an effort to assess student attitudes, a survey of 46 …
Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli
Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.
Keywords: honeypot, network forensics, visualization, Graphviz, Afterglow
Poster Session, Kentucky Water Resources Research Institute, University Of Kentucky
Poster Session, Kentucky Water Resources Research Institute, University Of Kentucky
Kentucky Water Resources Annual Symposium
- Kentucky Agriculture Water Quality Act Web Tool, Amanda Gumbert, UK Cooperative Extension Service
- Cane Run Watershed Council – An Adventure in Watershed Involvement, Amanda Gumbert, UK Cooperative Extension Service
- Preliminary Comparison of Nutrient and Total Suspended Sediment Data on Water Samples Collected using Teledyne Portable Autosampler and EPA Field Methods for Wadeable Streams, Susan Brown, April Haight and others, Institute for Regional Analysis and Public Policy, Morehead State University
- Groundwater Protection Plans, Patricia Keefe, Kentucky Division of Water
- Use of Geophysical Techniques to Locate a Karst Conduit in the Cane Run – Royal Spring Basin, Kentucky …
Session 2d, Kentucky Water Resources Research Institute, University Of Kentucky
Session 2d, Kentucky Water Resources Research Institute, University Of Kentucky
Kentucky Water Resources Annual Symposium
- The Warren County Blueways Initiative, Steve Spencer, Kevin Cary, and Tammy Stenger-Ramsey, Western Kentucky University
- The Big Sandy “Big Dip”: Effectiveness of a Community-Oriented and Geographically Intensive Approach to Assessing Small Headwater Stream Health, Reagan Weaver and Alice Jones, Environmental Research Institute, EKU
- Sanitation District Management of Replaced/Repaired Individual and Clustered Wastewater Treatment Systems in Olympia, Kentucky, Celia Barker, Bath County Health Dept, Jeffrey Brittingham and Barry Tonning, Tetra Tech
- Assessment of Combined Sewer Overflows, Elizabeth Coyle, Kentucky Water Resources Research Institute, UK
Session 2c, Kentucky Water Resources Research Institute, University Of Kentucky
Session 2c, Kentucky Water Resources Research Institute, University Of Kentucky
Kentucky Water Resources Annual Symposium
- Western Kentucky Deep Saline Reservoir CO2 Storage Test, David Williams and J. Richard Bowersox, Kentucky Geological Survey, UK
- Western Kentucky Deep Saline Reservoir CO2 Storage Test: Preliminary Environmental Assessments and Monitoring, E. Glynn Beck, Thomas Parris, and David Williams, Kentucky Geological Survey, UK
- Arsenite Oxidation by a Chemostat Culture of Thiomonas Arsenivorans Strain B6, Aniruddha Dastidar and Yi-Tin Wang, Dept Civil Engineering, UK
- Biological Control of Manganese in Water Supplies – A New Mn(II)-Oxidizing Bacteria Isolate, Michael Snyder and Y.T. Wang, Dept Civil Engineering, UK
Session 2b, Kentucky Water Resources Research Institute, University Of Kentucky
Session 2b, Kentucky Water Resources Research Institute, University Of Kentucky
Kentucky Water Resources Annual Symposium
- Watershed Based Planning in the Upper East Fork of Clarks River, Maggie Morgan, Four Rivers Basin Team, Paul Maron, Strand Associates, Inc
- Kentucky Institute for Watershed Management Support, Alanna Storey, Jana Fattic, and Andrew Ernest, Center for Water Resource Studies, WKU
- Overview of TMDL Development for Panther Creek and Long Falls Watersheds in Daviess and McLean Counties, Kentucky, Josh Brewer, Center for Water Resource Studies, WKU
- Nitrogen Isotopes to Study the Variability of Sediment Transported from a Lowland Watershed in the Bluegrass, Jimmy Fox and others, Dept Civil Engineering, UK
Session 2a, Kentucky Water Resources Research Institute, University Of Kentucky
Session 2a, Kentucky Water Resources Research Institute, University Of Kentucky
Kentucky Water Resources Annual Symposium
- Results of a Kentucky Stormwater Survey in MS4 Phase II Regions, Yvonne Meichtry and Julie Gee, Kentucky Transportation Cabinet
- The Bluegrass Rain Garden Alliance: An Approach to Improving Stormwater Quality for MS4 Communities in Central Kentucky, Brittany Zwicker and Amy Sohner, Bluegrass Rain Garden Alliance
- Give Your Brain to Science: Resource Materials for Teachers, Dan Carey, Kentucky Geological Survey, UK
- Integrating Environmental Education in the Curriculum, Kazi Javed and others, Kentucky State University
Session 1d, Kentucky Water Resources Research Institute, University Of Kentucky
Session 1d, Kentucky Water Resources Research Institute, University Of Kentucky
Kentucky Water Resources Annual Symposium
- Water/Wastewater Technician Training Institute: The First Year Retrospective, Christal Wade and Andrew Ernest, Center for Water Resource Studies, WKU
- Water Analysis, Training, Education and Research Services: A ‘Farmer’s Cooperative’ Model for Capacity Development, Andrew Ernest and Jana Fattic, Center for Water Resource Studies, WKU
- Utilizing a Content Management System for an Emergency Response Network for Water and Wastewater Districts, Karla Andrew, Center for Water Resource Studies, WKU
- Water Resource Management Capacity Development: A Small Systems Technology Transfer Model, Andrew Ernest, Center for Water Resource Studies, WKU