Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

2006

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 72

Full-Text Articles in Computer Engineering

Particle Swarm Optimization For Global Optimization Problems, Hsin-Chuan Kuo, Jiang-Ren Chang, Ching-Hsiang Liu Dec 2006

Particle Swarm Optimization For Global Optimization Problems, Hsin-Chuan Kuo, Jiang-Ren Chang, Ching-Hsiang Liu

Journal of Marine Science and Technology

In this paper, the particle swarm optimization (PSO), originated as a simulation of a simplified social system with swarm intelligence and having exploring and exploiting characteristics of the particle swarm, is adopted to deal with the global optimization problems. To begin with, four non-linear two-dimensional functions are adopted as benchmark examples for determining the suitable ranges of parameters in the PSO. It is found that uses of the PSO can make the search quickly converge to the global optimum. Then, several benchmark functions below ten-dimensions are adopted especially for comparisons of search efficiency on the PSO and other algorithms. Results …


Web Services Of Mms Applications On Mobile Devices, Cheng-Chih Yang, Cheng-Min Lin Dec 2006

Web Services Of Mms Applications On Mobile Devices, Cheng-Chih Yang, Cheng-Min Lin

Journal of Marine Science and Technology

This study develops the Web services that are applied in Multimedia Message Service (MMS) applications via the Internet and operated by mobile portable devices, such as Personal Digital Assistant (PDA) and cellular phone. First, a MMS system environment and architecture is modeled. Next, the operations and interface of the MMS system is defined by the Web Services Description Language (WSDL) to represent the web services on MMS application system. Finally, two system prototypes are described in this study that includes distance video cam monitor system and GPRS cellular phone MMS sender.


Magnetic Field Effects On Caco3 Precipitation Process In Hard Water, Nelson Saksono, Setijo Bismo, Elsa Krisanti, Azwar Manaf, Roekmijati Widaningrum Nov 2006

Magnetic Field Effects On Caco3 Precipitation Process In Hard Water, Nelson Saksono, Setijo Bismo, Elsa Krisanti, Azwar Manaf, Roekmijati Widaningrum

Makara Journal of Technology

Magnetic Field Effects on CaCO3 Precipitation Process in Hard Water. Magnetic treatment is applied as physical water treatment for scale prevention especially CaCO3, from hard water in piping equipment by reducing its hardness. Na2CO3 and CaCl2 solution sample was used in to investigate the magnetic fields influence on the formation of particle of CaCO3. By changing the strength of magnetic fields, exposure time and concentration of samples solution, this study presents quantitative results of total scale deposit, total precipitated CaCO3 and morphology of the deposit. This research was run by comparing magnetically and non-magnetically treated samples. The results showed an …


Biogasoline Production From Palm Oil Via Catalytic Hydrocracking Over Gamma-Alumina Catalyst, Anondho Wijanarko, Dadi Ahmad Mawardi, Mohammad Nasikin Nov 2006

Biogasoline Production From Palm Oil Via Catalytic Hydrocracking Over Gamma-Alumina Catalyst, Anondho Wijanarko, Dadi Ahmad Mawardi, Mohammad Nasikin

Makara Journal of Technology

Biogasoline Production from Palm Oil Via Catalytic Hydrocracking over Gamma-Alumina Catalyst. Bio gasoline conversion from palm oil is an alternative energy resources method which can be substituted fossil fuel base energy utilization. Previous research resulted that palm oil can be converted into hydrocarbon by catalytic cracking reaction with γ-alumina catalyst. In this research, catalytic cracking reaction of palm oil by γ-alumina catalyst is done in a stirrer batch reactor with the oil/catalyst weight ratio variation of 100:1, 75:1, and 50:1; at suhue variation of 260 to 340oC and reaction time variation of 1 to 2 hour. Post cracking reaction, bio …


Determination Of Operation Condition And Product Dimension Accuracy Optimization Of Filament Deposition Modelling On Layer Manufacturing Application, Slamet A. Widyanto, Alva Edy Tontowi, Jamasri Jamasri, Heru Santoso Budi Rochardjo Nov 2006

Determination Of Operation Condition And Product Dimension Accuracy Optimization Of Filament Deposition Modelling On Layer Manufacturing Application, Slamet A. Widyanto, Alva Edy Tontowi, Jamasri Jamasri, Heru Santoso Budi Rochardjo

Makara Journal of Technology

Layer manufacturing process has proven as a process that can produce a high complexity mechanical part. Now, Improvement of LM methods continuously conduct that is aimed to increase precessions and efficiency of these processes. Pressure filament deposition modelling is a form of layer manufacturing process that is designed to produce a plastic part with controlling its semisolid phase. In this research, the equipment of filament depositor is designed and tested to make the product filament deposition. With operation condition observation, the optimal temperature and pressure of deposition process was determined. These experiments used PVC as crystalline material and polypropylene as …


A Study On Parallel Computation Tools On Networked Pcs, Heru Suhartanto Nov 2006

A Study On Parallel Computation Tools On Networked Pcs, Heru Suhartanto

Makara Journal of Technology

A Study on Parallel Computation Tools on Networked PCs. Many models for natural phenomena, engineering applications and industries need powerfull computing resources to solve their problems. High Performance Computing resources were introduced by many researchers. This comes in the form of Supercomputers and with operating systems and tools for development such as parallel compiler and its library. However, these resources are expensive for the investation and maintenance, hence people need some alternatives. Many people then introduced parallel distributed computing by using available computing resource such as PCs. Each of these PCs is treated as a processors, hence the cluster of …


Segmental Sinusoidal Model For Speech Signal Coding, Florentinus Budi Setiawan, Soegijardjo Soegijoko, Sugihartono Sugihartono, Suhartono Tjondronegoro Nov 2006

Segmental Sinusoidal Model For Speech Signal Coding, Florentinus Budi Setiawan, Soegijardjo Soegijoko, Sugihartono Sugihartono, Suhartono Tjondronegoro

Makara Journal of Technology

Segmental Sinusoidal Model for Speech Signal Coding. Periodic signal can be decomposed by sinusoidal component with Fourier series. With this characteristic, it can be modeled referring by sinusoidal form. By the sinusoidal model, signal can be quantized in order to encode the speech signal at the lower rate. The recent sinusoidal method is implemented in speech coding. By using this method, a block of the speech signal with 20 ms to 30 ms width is coded based on Fourier series coefficients. The new method proposed is quantization and reconstruction of speech signal by the segmental sinusoidal model. A segment is …


Stress Corrosion Cracking Behavior Of Stainless Steel 304 In The Sulfuric Acid Environment Due To Prestrain, Mohammad Badaruddin, Ahmad Suudi, Arinal Hamni Nov 2006

Stress Corrosion Cracking Behavior Of Stainless Steel 304 In The Sulfuric Acid Environment Due To Prestrain, Mohammad Badaruddin, Ahmad Suudi, Arinal Hamni

Makara Journal of Technology

Stress Corrosion Cracking Behavior of Stainless Steel 304 in the Sulfuric Acid Environment Due to Prestrain. The aim of research is to investigate the effect of prestrain on the stress corossion cracking behavior of AISI 304 stainless steel in the sulfuric acid of 10% concentration under the static cantilever loading according to ASTM E-1681 standart. The specimen of 304 Stainless steel was strain up over the yield strength until reaching the uniform strain of 5% and 10% using servopulser UTM 9506 under the displacement control of 0,3 mm/sec. The results of test show that the prestrain of 5% specimen is …


Crude Oil Sludge Degradation In Microcosmic Scale: Simple Simulation As Preliminary Study On Land Treatment Bioremediation., Astri Nugroho Nov 2006

Crude Oil Sludge Degradation In Microcosmic Scale: Simple Simulation As Preliminary Study On Land Treatment Bioremediation., Astri Nugroho

Makara Journal of Technology

Crude Oil Sludge Degradation in Microcosmic Scale: Simple Simulation as Preliminary Study on Land Treatment Bioremediation. A study in microcosmic condition has been carried out to evaluate the bacterial hydrocarbonoclastic capability in increasing the oil sludge degradation being mixed with NPK fertilizer as nitrogen resources. Aerobic test was carried out by putting erlenmeyers in a shaker incubator, 120 rpm shaking speed, at 50°C temperature. While 150 days in microcosmic one observation showed that the consortium has the potential to grow up to 50% (v/v) sludge oil load. Maximum growth and maximum growth rate of the consortium occurred in the III …


What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley Sep 2006

What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley

The University of New Hampshire Law Review

Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …


Effect Of Firing Temperature And Holding Time On Characterization Of Al/Sic Metal Matrix Composites Produced By Pressureless Infiltration., Anne Zulfia, Myrna Ariati Apr 2006

Effect Of Firing Temperature And Holding Time On Characterization Of Al/Sic Metal Matrix Composites Produced By Pressureless Infiltration., Anne Zulfia, Myrna Ariati

Makara Journal of Technology

Effect of Firing Temperature and Holding Time on Characterization of Al/SiC Metal Matrix Composites Produced by Pressureless Infiltration. The production of Al-SiC metal matrix composite can be carried out by pressureless metal infiltration processs (PRIMEX). The experiment was conducted using aluminium AC2B ingot as a matrix and 50%Vf SiC powder as a reinforcement which is mixed with 10% Mg powder for wetting agent. The variables of this experiment are holding time and firing temperature to investigate the effect of these conditions on mechanical properties of Al-SiC metal matrix composites. Holding time was conducted for 2,5,8,10,12 hours and firing temperatures was …


On The Performance Of Imt-2000 Communication Link Based On Stratospheric Platforms, Iskandar Iskandar, Shigeru Shimamoto Apr 2006

On The Performance Of Imt-2000 Communication Link Based On Stratospheric Platforms, Iskandar Iskandar, Shigeru Shimamoto

Makara Journal of Technology

A new means for providing wireless communication has been currently proposed. It is based on aerial vehicle known as High Altitude Platform or Stratospheric Platforms (SPF). The SPF will be operated at an altitude of 17-22 km above the ground. Therefore, the channel condition may be different compared with those of the conventional terrestrial or satellite wireless channel. In this paper, the channel propagation characteristic of such a system is firstly investigated by means of ray tracing algorithm. We emphasize our investigation in a typical urban environment, in which the mobile users mostly exist. We developed building block model for …


Development Of Fiber-Optic Humidity Sensor Probe With Gelatin Cladding, Akhiruddin Maddu, Kun Modjahidin, Sar Sardy, Hamdani Zain Apr 2006

Development Of Fiber-Optic Humidity Sensor Probe With Gelatin Cladding, Akhiruddin Maddu, Kun Modjahidin, Sar Sardy, Hamdani Zain

Makara Journal of Technology

Development of Fiber-Optic Humidity Sensor Probe with Gelatin Cladding. Humidity sensor based on optical fiber with gelatin cladding has been developed. In this humidity sensor probe, the origin cladding of optical fiber is replaced by gelatin coating as humidity sensitive cladding. Testing of the optical fiber sensor probe was conducted by measuring of light intensity transmitted on the optical fiber probe for each variation of different humidity treatments. Response of the optical fiber sensor probe measured from 42%RH to 99%RH, the results show an optical transmission curve varied with relative humidity (RH). Optical transmission in the optical fiber probe increase …


Analysis Of Technical Energy Losses By Using Simulation, Betrianis Betrianis, Randite Herawan Apr 2006

Analysis Of Technical Energy Losses By Using Simulation, Betrianis Betrianis, Randite Herawan

Makara Journal of Technology

Model is a representation of a system. Through model, it can be easier to forecast and control the changing of each element system. Electricity distribution is also a system. Losses are general problem that exist in a distribution network system. But with the right methods, specifically technical energy losses can be reduced in order to increase the efficiency. By making model of the distribution network, the value of technical energy losses in the whole network as well as in every line can be observed. Simulation can also be used to see all losses reduction alternatives. By comparing results from each …


Modification Of Bonding Strength Test Of Wc Hvof Thermal Spray Coating On Rocket Nozzle, Bondan T. Sofyan, Haposan J. Pardede, Marizki Stefano, Edi Sofyan Apr 2006

Modification Of Bonding Strength Test Of Wc Hvof Thermal Spray Coating On Rocket Nozzle, Bondan T. Sofyan, Haposan J. Pardede, Marizki Stefano, Edi Sofyan

Makara Journal of Technology

Modification of Bonding Strength Test of WC HVOF Thermal Spray Coating on Rocket Nozzle. One way to reduce structural weight of RX-100 rocket is by modifying the nozzle material and processing. Nozzle is the main target in weight reduction due to the fact that it contributes 30 % to the total weight of the structur. An alternative for this is by substitution of massive graphite, which is currently used as thermal protector in the nozzle, with thin layer of HVOF (High Velocity Oxy-Fuel) thermal spray layer. This paper presents the characterization of nozzle base material as well as the modification …


Modeling Of Coupled-Tank System Using Fuzzy Takagi-Sugeno Model, Aries Subiantoro Apr 2006

Modeling Of Coupled-Tank System Using Fuzzy Takagi-Sugeno Model, Aries Subiantoro

Makara Journal of Technology

Modeling of Coupled-Tank System Using Fuzzy Takagi-Sugeno Model. This paper describes modeling of coupledtank system based on data measurement using fuzzy Takagi-Sugeno model. The fuzzy clustering method of Gustafson- Kessel algorithm is used to classify input-output data into several clusters based on distance similarity of a member of input-output data from center of cluster. The formed clusters are projected orthonormally into each linguistic variables of premise part to determine membership function of fuzzy Takagi-Sugeno model. By estimating data in each cluster, the consequent parameters of fuzzy Takagi-Sugeno model are calculated using weighted least-squares method. The resulted fuzzy Takagi-Sugeno model is …


Design Of Induction Motor Drive Without Velocity Sensor Using Current Vector Controller With Full And Reduced Observer Moving To Dq Axis, Ridwan Gunawan, Feri Yusivar, Wahidin Wahab, Zuhal A. Kadir Apr 2006

Design Of Induction Motor Drive Without Velocity Sensor Using Current Vector Controller With Full And Reduced Observer Moving To Dq Axis, Ridwan Gunawan, Feri Yusivar, Wahidin Wahab, Zuhal A. Kadir

Makara Journal of Technology

Design of Induction Motor Drive Without Velocity Sensor Using Current Vector Controller with Full and Reduced Observer Moving to DQ Axis. The observer is used in estimation velocity sensor usually in α-β axis, therefore this situation will need an extra transformation when we want to add compensator because the flux model is in direct and quadrature-axis dq. Every used the transformation to make possible emerge an error. So in this simulation is used a method to estimate the velocity of induction motor drive with observer that is moved to dq-axis. The model of actual motor used is in alfa-beta axis, …


Hybrid Identification System With Arx And Fast Fourier Transform In Application Of A Quarter Of Vehicle Half Active Suspension, Noveri Lysbetti M, Antonius R. Apr 2006

Hybrid Identification System With Arx And Fast Fourier Transform In Application Of A Quarter Of Vehicle Half Active Suspension, Noveri Lysbetti M, Antonius R.

Makara Journal of Technology

Hybrid Identification System with ARX and Fast Fourier Transform in Application of a Quarter of Vehicle Half Active Suspension. In a control system problem, identification system mechanism is a absolute thing, especially in adaptation controlling to disturbance changing. For that case, is needed an identification method which can identify the changing of disturbance in that system. The aim of this research is to give an alternative in system/plant identification which is a combination (hybrid) of ARX and Fast Fourier Transform. So, it is needed an algorithm design for identification process. In this case, the designed algorithm will be implemented in …


Performance Analysis Of Mc-Cdma Communication Systems Over Nakagami-M Environments, Joy Iong-Zong Chen Mar 2006

Performance Analysis Of Mc-Cdma Communication Systems Over Nakagami-M Environments, Joy Iong-Zong Chen

Journal of Marine Science and Technology

The performance for a MC-CDMA (multi-carrier coded-division multiple-access) system working in uncorrelated and correlated fading channels with Nakagami distribution is investigated in this paper. We adopt the BPSK modulation scheme with an alternative expression for Q-function to evaluate the BER (bit error rate) performance of the MC-CDMA system. The sum of Gamma variates is adopted for deriving a closed-form solution for arbitrarily correlated channel in order to avoid the difficulty of explicitly obtaining the pdf (probability density function) for the SNR (signal-to-noise ratio) at the MRC (maximum ratio combining) output. The results with simple expression obviously show that the BER …


Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler Jan 2006

Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the first Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas Jan 2006

The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas

Journal of Digital Forensics, Security and Law

All organisations, whether in the public or private sector, use computers for the storage and processing of information relating to their business or services, their employees and their customers. A large proportion of families and individuals in their homes now also use personal computers and, both intentionally and inadvertently, often store on those computers personal information. It is clear that most organisations and individuals continue to be unaware of the information that may be stored on the hard disks that the computers contain, and have not considered what may happen to the information after the disposal of the equipment.

In …


Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz Jan 2006

Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz

Journal of Digital Forensics, Security and Law

This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological design. It demonstrates that efficient searching is produced through the use of such a design and points to further work that might be carried out to extend this concept.


A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli Jan 2006

A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli

Journal of Digital Forensics, Security and Law

Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation. This paper outlines research that has resulted in the development of a tool for the extraction of ICQ log file entries. Detailed reconstruction of data from log files was achieved with a number of different ICQ software. There are several limitations with the current design including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to …


A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns Jan 2006

A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation of financial reporting and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, internal and external auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs and instruction in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity – is limited. Only a few university-level …


Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier Jan 2006

Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier

Journal of Digital Forensics, Security and Law

Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.

The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …


The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox Jan 2006

The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox

Journal of Digital Forensics, Security and Law

The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet …


Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka Jan 2006

Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka

Journal of Digital Forensics, Security and Law

Most organizations and government agencies regularly become engaged in litigation with suppliers, customers, clients, employees, competitors, shareholders, prosecutors or regulatory agencies that nearly assures the need to organize, retain, find and produce business records and correspondence, emails, accounting records or other data relevant to disputed issues. This article discusses some high visibility cases that constrain how metadata and content is routinely made available to opposing parties in civil litigation, to prosecutors in criminal prosecutions and to agency staff in regulatory enforcement litigation. Public policy, as implemented in the rules of evidence and pretrial discovery, restrict electronic data discovery (EDD) as …


Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota Jan 2006

Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota

Journal of Digital Forensics, Security and Law

With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …


Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan Jan 2006

Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan

Journal of Digital Forensics, Security and Law

Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …


Is Forensic Computing A Profession? Revisiting An Old Debate In A New Field, Bernd C. Stahl Jan 2006

Is Forensic Computing A Profession? Revisiting An Old Debate In A New Field, Bernd C. Stahl

Journal of Digital Forensics, Security and Law

Forensic Computing is a new and quickly developing field. It is in the process of becoming an academic discipline or sub-discipline with all the features from full undergraduate and postgraduate course provision to conferences and journals. An important question in this process of turning into an established discipline is whether it will coincide with the recognition of the graduates as professionals. This paper hopes to stimulate the debate as to whether forensic computing is or should be a discipline. In order to approach this question, the paper will discuss the concept of forensic computing including the most salient topics of …