Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Modeling And Control Of Discrete Event Systems Using Finite State Machines With Variables And Their Applications In Power Grids, Junhui Zhao, Le Yi Wang, Zhong Chen, Feng Lin, Hongwei Zhang Jan 2012

Modeling And Control Of Discrete Event Systems Using Finite State Machines With Variables And Their Applications In Power Grids, Junhui Zhao, Le Yi Wang, Zhong Chen, Feng Lin, Hongwei Zhang

Electrical & Computer Engineering and Computer Science Faculty Publications

Control theories for discrete event systems modeled as finite state machines have been well developed to address various fundamental control issues. However, finite state machine model has long suffered from the problem of state explosion that renders it unsuitable for some practical applications. In an attempt to mitigate the state explosion problem, we propose an efficient representation that appends finite sets of variables to finite state machines in modeling discrete event systems. We also present the control synthesis techniques for such finite state machines with variables (FSMwV). We first present our notion and means of control under this representation. We …


Forensic Analysis Of Social Networking Applications On Mobile Devices, Noora Al Mutawa, Ibrahim Baggili, Andrew Marrington Jan 2012

Forensic Analysis Of Social Networking Applications On Mobile Devices, Noora Al Mutawa, Ibrahim Baggili, Andrew Marrington

Electrical & Computer Engineering and Computer Science Faculty Publications

The increased use of social networking applications on smartphones makes these devices a goldmine for forensic investigators. Potential evidence can be held on these devices and recovered with the right tools and examination methods. This paper focuses on conducting forensic analyses on three widely used social networking applications on smartphones: Facebook, Twitter, and MySpace. The tests were conducted on three popular smartphones: BlackBerrys, iPhones, and Android phones. The tests consisted of installing the social networking applications on each device, conducting common user activities through each application, acquiring a forensically sound logical image of each device, and performing manual forensic analysis …


Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili Jan 2012

Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software-automated examination).The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an iOS device, then …