Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 187

Full-Text Articles in Computer Engineering

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz Sep 2013

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz

Journal of Digital Forensics, Security and Law

Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …


Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula Jan 2013

Automating Vendor Fraud Detection In Enterprise Systems, Kishore Singh, Peter Best, Joseph Mula

Journal of Digital Forensics, Security and Law

Fraud is a multi-billion dollar industry that continues to grow annually. Many organizations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper, we adopt a DesignScience methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated by developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of …


Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle Jan 2013

Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton Jan 2013

A Simple Experiment With Microsoft Office 2010 And Windows 7 Utilizing Digital Forensic Methodology, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using …


Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee Jan 2013

Information Security Challenge Of Qr Codes, Nik Thompson, Kevin Lee

Journal of Digital Forensics, Security and Law

The discipline of information security must adapt to new technologies and methods of interaction with those technologies. New technologies present both challenges and opportunities for the security professional, especially for areas such as digital forensics. Challenges can be in the form of new devices such as smartphones or new methods of sharing information, such as social networks. One such rapidly emerging interaction technology is the use of Quick Response (QR) codes. These offer a physical mechanism for quick access to Web sites for advertising and social interaction. This paper argues that the common implementation of QR codes potentially presents security …


Book Review: Placing The Suspect Behind The Keyboard: Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects, Thomas Nash Jan 2013

Book Review: Placing The Suspect Behind The Keyboard: Using Digital Forensics And Investigative Techniques To Identify Cybercrime Suspects, Thomas Nash

Journal of Digital Forensics, Security and Law

In this must read for any aspiring novice cybercrime investigator as well as the seasoned professional computer guru alike, Brett Shaver takes the reader into the ever changing and dynamic world of Cybercrime investigation. Shaver, an experienced criminal investigator, lays out the details and intricacies of a computer related crime investigation in a clear and concise manner in his new easy to read publication, Placing the Suspect behind the Keyboard. Using Digital Forensics and Investigative techniques to Identify Cybercrime Suspects. Shaver takes the reader from start to finish through each step of the investigative process in well organized …


Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle Jan 2013

Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko Jan 2013

Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko

Journal of Digital Forensics, Security and Law

The article surveys the changing risk environment for corporations from their employees’ electronic communications. It identifies the types of liabilities that corporations can incur from such employee communications. It discusses the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of a traditional “laundry list” of internet use prohibitions.


How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw Jan 2013

How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw

Journal of Digital Forensics, Security and Law

This research uses two recently introduced observer rating scales, (Shaw et al., 2013) for the identification and measurement of negative sentiment (the Scale for Negativity in Text or SNIT) and insider risk (Scale of Indicators of Risk in Digital Communication or SIRDC) in communications to test the performance of psycholinguistic software designed to detect indicators of these risk factors. The psycholinguistic software program, WarmTouch (WT), previously used for investigations, appeared to be an effective means for locating communications scored High or Medium in negative sentiment by the SNIT or High in insider risk by the SIRDC within a randomly selected …


Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod Jan 2013

Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod

Journal of Digital Forensics, Security and Law

This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the …


Science Column: Reconstruction: The Experimental Side Of Digital Forensics, Fred Cohen Jan 2013

Science Column: Reconstruction: The Experimental Side Of Digital Forensics, Fred Cohen

Journal of Digital Forensics, Security and Law

Many in digital forensics seem to forget that the science part of digital forensics means experimentation and that implies a whole lot of things that most practitioners never learned.


The Advanced Data Acquisition Model (Adam): A Process Model For Digital Forensic Practice, Richard Adams, Val Hobbs, Graham Mann Jan 2013

The Advanced Data Acquisition Model (Adam): A Process Model For Digital Forensic Practice, Richard Adams, Val Hobbs, Graham Mann

Journal of Digital Forensics, Security and Law

As with other types of evidence, the courts make no presumption that digital evidence is reliable without some evidence of empirical testing in relation to the theories and techniques associated with its production. The issue of reliability means that courts pay close attention to the manner in which electronic evidence has been obtained and in particular the process in which the data is captured and stored. Previous process models have tended to focus on one particular area of digital forensic practice, such as law enforcement, and have not incorporated a formal description. We contend that this approach has prevented the …


System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter Jan 2013

System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter

Journal of Digital Forensics, Security and Law

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …


Book Review: Iphone And Ios Forensic: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Simson Garfinkel Jan 2013

Book Review: Iphone And Ios Forensic: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Simson Garfinkel

Journal of Digital Forensics, Security and Law

In April 2011 news outlets around the world revealed shocking news about Apple’s iPhone: for reasons that were not apparently clear, every iPhone contained a small SQLite database that logged where and when the user had been whenever the phone was turned on, and those records went back for pretty much as long as the user had owned their phone. Apple eventually declared that the data cache was the result of a bug and issued a software update to prune the database (it had previously grown without limit). Privacy activists rejoiced that their beloved iPhones were once again trustworthy. But …


Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson Jan 2013

Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson

Journal of Digital Forensics, Security and Law

Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades. As the total amount of data stored rapidly increases in conjunction with the amount of widely available computer-driven devices being used, solutions are being developed to better harness this data (LaTulippe, 2011). One of these solutions is commonly known as a search appliance. Search appliances have been used in e-discovery for several years. The Google Mini Search Appliance (Mini) has not only been used for e-discovery, but for indexing and searching internal documents. To accomplish these tasks, search …


Table Of Contents Jan 2013

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2013

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2013

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


A Practical Disturbance Generator To Test Performances Of Various Power Quality Mitigation Devices, Ahmet Teke, Mehmet Emi̇n Meral, Mehmet Tümay, Mehmet Uğraş Cuma Jan 2013

A Practical Disturbance Generator To Test Performances Of Various Power Quality Mitigation Devices, Ahmet Teke, Mehmet Emi̇n Meral, Mehmet Tümay, Mehmet Uğraş Cuma

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a practical thyristor-based 3-phase sag/swell/outage generator (disturbance generator) is designed to test various power quality mitigation devices (PQMDs), such as solid state transfer switch (SSTS), static voltage compensator (SVC), and uninterruptible power supply. The latest technological disturbance generators (DGs) and the proposed DG are comprehensively discussed and compared with focus on usefulness, economic aspects, and simplicity. The proposed DG is used for experimentally generating different fault conditions and testing a SSTS. The comparisons and analyses show that the proposed DG is an optimum and simple solution to generate sag, swell, unbalance, overvoltage, undervoltage, and outage to test …


Circulating Current Analysis Between Strands In Armature Winding Of A Turbo-Generator Using Analytical Model, Karim Abbaszadeh, Farhad Rezaee Alam Jan 2013

Circulating Current Analysis Between Strands In Armature Winding Of A Turbo-Generator Using Analytical Model, Karim Abbaszadeh, Farhad Rezaee Alam

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, the circulating current analysis between strands is studied while considering the different transpositions in the active part and without considering the transposition in the end winding region. First, this analysis is done while only considering the slot region, and then the end winding region is added to the model. The model used for this analysis is a circuit model, including the resistance and inductance of the strands and their induced back-electromotive force (EMF). The back-EMF sources and inductances are calculated through a 2D finite element analysis (FEA) of the active part and a 3D FEA for the …


Current-Mode Quadrature Oscillator Based On Cccdtas With Noninteractive Dual-Current Control For Both Condition Of Oscillation And Frequency Of Oscillation, Adirek Jantakun, Winai Jaikla Jan 2013

Current-Mode Quadrature Oscillator Based On Cccdtas With Noninteractive Dual-Current Control For Both Condition Of Oscillation And Frequency Of Oscillation, Adirek Jantakun, Winai Jaikla

Turkish Journal of Electrical Engineering and Computer Sciences

The realization of 2 current-mode quadrature oscillators using current-controlled current differencing transconductance amplifiers (CCCDTAs) and grounded capacitors is presented. The proposed oscillators can provide 2 sinusoidal output currents with a 90° phase difference. They enable noninteractive dual-current control for both the condition of oscillation and the frequency ofi oscillation. The high-output impedances of the configurations enable the circuit to be cascaded without additional current buffers. The use of only grounded capacitors is ideal for integration. The circuit performances are depicted through PSpice simulations; they show good agreement to theoretical anticipation.


Modified Iterated Extended Kalman Particle Filter For Single Satellite Passive Tracking, Panlong Wu, Jianshou Kong, Yuming Bo Jan 2013

Modified Iterated Extended Kalman Particle Filter For Single Satellite Passive Tracking, Panlong Wu, Jianshou Kong, Yuming Bo

Turkish Journal of Electrical Engineering and Computer Sciences

Single satellite-to-satellite passive tracking techniques have great significance in space surveillance systems. A new passive modified iterated extended Kalman particle filter (MIEKPF) using bearings-only measurements in the Earth-Centered Inertial Coordinate System is proposed. The modified iterated extended Kalman filter (MIEKF), with a new maximum likelihood iteration termination criterion, is used to generate the proposal distribution of the MIEKPF. Moreover, a new measurement update equation of the MIEKF is derived by modifying the objective function of the Gauss--Newton iteration. The approximated second-order linearized state propagation equation, Jacobian matrix of state transfer, and measurement equations are derived in satellite 2-body movement. The …


The Development Of A Hardware- And Software-Based Simulation Platform For The Training Of Driver Candidates, Abdullah Çavuşoğlu, İsmai̇l Kurnaz Jan 2013

The Development Of A Hardware- And Software-Based Simulation Platform For The Training Of Driver Candidates, Abdullah Çavuşoğlu, İsmai̇l Kurnaz

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a traffic simulation system (TSS) to provide novice driver candidates with opportunities for training and testing has been developed. Autonomous vehicles that follow the flow of traffic in a microsimulation environment were prepared using a hierarchical concurrent state machine. Autonomous vehicles are skilled and have behavioral aspects such as tracking the lanes, following the vehicles, complying with traffic rules, decelerating, accelerating, and intersection crossings. These driver behaviors are parameterized to allow the autonomous agents to act while disregarding the rules (i.e. aggressive behaviors) or behaving normally. The TSS is operated in 3 different modes, namely the orientation, …


A Comparative Study In Power Oscillation Damping By Statcom And Sssc Based On The Multiobjective Pso Algorithm, Ali Ajami, Mehdi Armaghan Jan 2013

A Comparative Study In Power Oscillation Damping By Statcom And Sssc Based On The Multiobjective Pso Algorithm, Ali Ajami, Mehdi Armaghan

Turkish Journal of Electrical Engineering and Computer Sciences

To improve the damping of power system oscillations by supplementary controller design for the static synchronous series compensator (SSSC) and static synchronous compensator (STATCOM), a multiobjective function based on the particle swarm optimization (PSO) algorithm for solving this optimization problem is introduced. The presented objective function includes the damping factor and the damping ratio of the lightly damped and undamped electromechanical modes. These controllers are adjusted to concurrently transfer the lightly damped and undamped electromechanical modes to a recommended region in the s-plane. For this purpose, the reduced linearized Phillips-Heffron model of the power system with a single machine and …


Control In Networked Systems With Fuzzy Logic, Akhan Akbulut, Oğuzhan Öztaş Jan 2013

Control In Networked Systems With Fuzzy Logic, Akhan Akbulut, Oğuzhan Öztaş

Turkish Journal of Electrical Engineering and Computer Sciences

Recently, the development of control systems based on network-based architecture is getting very high attention. Because of its fast data communication, network-based control is in high demand. However, there are some disadvantages, such as delays, data packet dropouts, and communication constraints. Network-based control systems are getting attention in the development of this architecture because of these disadvantages. Optimization of the system is supplied to improve the existing structure. The optimization is categorized into 2 main structures: software optimization and hardware optimization. The structure of the overall system is designed with these optimization strategies. A hierarchical and communicational structure has emerged …


Optimal Release Policies For A Software System With Warranty Cost And Change-Point Phenomenon, D.R. Prince Williams Jan 2013

Optimal Release Policies For A Software System With Warranty Cost And Change-Point Phenomenon, D.R. Prince Williams

Turkish Journal of Electrical Engineering and Computer Sciences

Determining the software quality and release time of the software is an important role of software reliability. Software reliability growth models (SRGMs) are applications of software reliability. The change-point is defined as the prominent change in the software testing time, in connection with the quality of a software error occurrence or error-detection phenomenon. As a result, the software reliability growth process, based on the change-point, affects the precision of the software reliability prediction, based on the SRGMs. To find the accurate total expected delivery cost with a suitable warranty period of the software system, a new cost model for the …


A Bacterial Foraging Optimization Approach For Tuning Type-2 Fuzzy Logic Controller, Mohammad Kiani, Seyed Mohammad Ali Mohammadi, Ali Akbar Gharaveisi Jan 2013

A Bacterial Foraging Optimization Approach For Tuning Type-2 Fuzzy Logic Controller, Mohammad Kiani, Seyed Mohammad Ali Mohammadi, Ali Akbar Gharaveisi

Turkish Journal of Electrical Engineering and Computer Sciences

The type-1 fuzzy sets theory was proposed to handle uncertainty in control systems, but some cases showed some liabilities of type-1 fuzzy sets when faced with unpredictable disturbance and uncertainties. Therefore, type-2 fuzzy sets were introduced and extended while providing more degrees of freedom in designing criteria. The most important specification of type-2 fuzzy sets is the interval between a superior membership function and an inferior membership function, which is called the footprint of uncertainty. This paper presents a bacterial foraging optimization approach for optimizing the parameterized membership function. The above criterion is applied to an automatic voltage regulator system …


Characterization Of Internal Disturbances And External Faults In Transformers Using An S-Transform--Based Algorithm, Abdolaziz Ashrafian, Mehrdad Rostami, Gevorg .B Gharehpetian Jan 2013

Characterization Of Internal Disturbances And External Faults In Transformers Using An S-Transform--Based Algorithm, Abdolaziz Ashrafian, Mehrdad Rostami, Gevorg .B Gharehpetian

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, the S-transform is used to discriminate between the internal disturbances and external faults of transformers. The proposed algorithm consists of 2 stages. The internal disturbances and the external faults are distinguished in the first stage. Next, the S-transform is applied to differential currents of faulty phases and the absolute deviation of the S-matrix is calculated. The relay scheme issues a trip signal in the case of an internal fault, according to the absolute deviation of the S-matrix. The scheme is implemented in a MATLAB environment and the inputs are differential currents, derived from EMTP software. In order …


Exergoeconomic Analysis Of A Solar Photovoltaic System In İstanbul, Turkey, Ercan İzgi̇, Yunus Emre Akkaya Jan 2013

Exergoeconomic Analysis Of A Solar Photovoltaic System In İstanbul, Turkey, Ercan İzgi̇, Yunus Emre Akkaya

Turkish Journal of Electrical Engineering and Computer Sciences

This paper deals with the exergoeconomic analysis of a 750-Wp solar photovoltaic (PV) system that is constructed at the Meteorology Park of İstanbul Technical University (41.102° N, 29.02° E) in İstanbul, Turkey. It is known that seasonal differences cause a variation in the exergoeconomic parameters (energy and exergy loss rates) of solar PV systems. Due to this perspective, for regional climatic parameters 2 months are selected: April to represent the spring and August to represent the summer. Within this research, first the exergy analysis is performed on the system and then the economic values of the results are evaluated using …


Symbol Detection Using The Differential Evolution Algorithm In Mimo-Ofdm Systems, Muhammet Nuri̇ Seyman, Necmi̇ Taşpinar Jan 2013

Symbol Detection Using The Differential Evolution Algorithm In Mimo-Ofdm Systems, Muhammet Nuri̇ Seyman, Necmi̇ Taşpinar

Turkish Journal of Electrical Engineering and Computer Sciences

Channel estimation and symbol detection in multiple-input and multiple-output (MIMO)-orthogonal frequency division multiplexing (OFDM) systems are essential tasks. Although the maximum likelihood (ML) detector reveals excellent performance for symbol detection, the computational complexity of this algorithm is extremely high in systems with more transmitter antennas and high-order constellation size. In this paper, we propose the differential evolution (DE) algorithm in order to reduce the search space of the ML detector and the computational complexity of symbol detection in MIMO-OFDM systems. The DE algorithm is also compared to some heuristic approaches, such as the genetic algorithm and particle swarm optimization. According …