Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Big Data (2)
- ADS-B (1)
- Aeronautical engineering (1)
- Aerospace engineering (1)
- Air traffic management (1)
-
- Aviation engineering (1)
- Big forensic data (1)
- Bit errors (1)
- Chip-off (1)
- Cloud Computing (1)
- Communications (1)
- Design-Based Research (1)
- Digital Technology (1)
- Digital forensics (1)
- Education (1)
- EnCase (1)
- Flash memory chip (1)
- Forensic analysis (1)
- Forensics (1)
- Hadoop (1)
- Internet of Things (1)
- Map and Reduce (1)
- NAND flash memory (1)
- NodeXL (1)
- Physical acquisition (1)
- Quantitative analysis (1)
- Review (1)
- Social Network Analysis (1)
- Social Network analysis (1)
- Technology (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Ads-B Communication Interference In Air Traffic Management, George Ray
Ads-B Communication Interference In Air Traffic Management, George Ray
International Journal of Aviation, Aeronautics, and Aerospace
Automated Dependent Surveillance Broadcast (ADS-B) provides position and state information about aircraft and is becoming an essential component in the global air traffic management system. ADS-B transponders broadcast this key information on a common frequency to both other aircraft and to secondary surveillance radar systems located at ground stations. Both the aircraft transponders and the ground stations work together to assist in managing the commercial airspace. Since the aircraft transponders all broadcast on the same frequency and are in close proximity there is an apparent risk of interference and the garbling of the communications needed to manage the airspace.
The …
Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell
Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell
Journal of Digital Forensics, Security and Law
Throughout the digital forensic community, chip-off analysis provides examiners with a technique to obtain a physical acquisition from locked or damaged digital device. Thermal based chip-analysis relies upon the application of heat to remove the flash memory chip from the circuit board. Occasionally, a flash memory chip fails to successfully read despite following similar protocols as other flash memory chips. Previous research found the application of high temperatures increased the number of bit errors present in the flash memory chip. The purpose of this study is to analyze data collected from chip-off analyses to determine if a statistical difference exists …
Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez
Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez
International Journal of Aviation, Aeronautics, and Aerospace
The constant demands that technology creates in aerospace engineering also influence education. The identification of the technologies with practical application in aerospace engineering is of current interest to decision makers in both universities and industry. A social network approach enhances this scoping review of the research literature to identify the main topics using the Big Five technologies in aerospace engineering education. The conceptual structure of the dataset (n=447) was analyzed from different approaches: at macro-level, a comparative of the digital technology identified by cluster analysis with the number of co-words established in 3 and 8 and, a keyword central structure …
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
Journal of Digital Forensics, Security and Law
Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …