Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

2016

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 471

Full-Text Articles in Computer Engineering

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


Single Propeller Drone (Singrone): Inovasi Rancang Bangun Drone Single Propeller Sebagai Wahana Pemetaan Lahan Berbasis Unmaned Aerial Vehicle (Uav), Mohammad Giffari Anta Pradana Dec 2016

Single Propeller Drone (Singrone): Inovasi Rancang Bangun Drone Single Propeller Sebagai Wahana Pemetaan Lahan Berbasis Unmaned Aerial Vehicle (Uav), Mohammad Giffari Anta Pradana

Elinvo (Electronics, Informatics, and Vocational Education)

Dewasa ini, teknologi sebagai faktor memberikan kontribusi yang signifikan dalam peningkatan
kualitas hidup manusia. Salah satu teknologi yang berkembang saat ini adalah drone. Drone adalah
pesawat tanpa awak yang dikendalikan dengan sebuah remote control , di lengkapi dengan GPS sebagai
navigasi, dan lock position. Pada umumnya drone digunakan untuk berbagai hal, seperti pemantauan lalu
lintas, pemetaan lahan, investigasi dan sebagainya. Namun penggunaan drone dengan menggunakan
banyak propeller merupakan salah satu masalah penggunaan drone. Semakin banyak propeller yang
digunakan, maka masa hidup drone di udara juga akan semakin berkurang. Hal ini diarenakan baterai
yang digunakan oleh wahana tersebut banyak digunakan untuk …


Sistem Monitoring Pencemaran Polutan Kendaraan Via Gadget Berbasis Arduino, Adibatul Ardianto Dec 2016

Sistem Monitoring Pencemaran Polutan Kendaraan Via Gadget Berbasis Arduino, Adibatul Ardianto

Elinvo (Electronics, Informatics, and Vocational Education)

Sumber polusi udara salah satunya adalah gas buang kendaraan bermotor, gas yang dihasilkan dari pembakaran bahan bakar terjadi pada mesin kendaraan. Tingkat deteksi aplikasi dari sistem pembuangan kendaraan bermotor yang dibuat digunakan untuk mendeteksi jumlah kadar gas H2, gas EtOH dan gas CO dengan menggunakan sensor TGS2201. Data dari sensor diolah oleh arduino dan hasilnya ditampilkan pada PC melalui port serial, desain program aplikasi dengan menggunakan Bahasa C.


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley Dec 2016

Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley

Military Cyber Affairs

Lexical Link Analysis (LLA) is a form of text mining in which word meanings represented in lexical terms (e.g., word pairs) are treated as if they are in a community of a word network. LLA can provide automated awareness for analyzing text data and reveal previously unknown, data-driven themed connections. We applied LLA to develop authentic archetypes and conversely determine potential imposters of that same archetype. We use publically available social media data to develop a cyber professional as an example. This paper reports the development of the algorithm, the collection and labeling of data, as well as the results …


Recent Semantic Changes For The Term "Digital", Tore Brattli Dec 2016

Recent Semantic Changes For The Term "Digital", Tore Brattli

Proceedings from the Document Academy

The term digital originates from the Latin word for finger/counting and has for many years been used to denote discrete signals and information, as opposed to analog. Discrete representation is an important principle, not only in computers, but also for (printed) text, music scores and even our genes. Recently however, the use of the term has increased and the meaning expanded to include almost everything related to information technology, e.g. digital natives and digital addiction. This study investigates the core principles of digital representation and compares this concept with the recent usage, with a focus on Norwegian media. The purpose …


Characterization And Utilization Of Calcium Oxide (Cao) Thermally Decomposed From Fish Bones As A Catalyst In The Production Of Biodiesel From Waste Cooking Oil, Aldes Lesbani, Sabat Okta Ceria Sitompul, Risfidian Mohadi, Nurlisa Hidayati Dec 2016

Characterization And Utilization Of Calcium Oxide (Cao) Thermally Decomposed From Fish Bones As A Catalyst In The Production Of Biodiesel From Waste Cooking Oil, Aldes Lesbani, Sabat Okta Ceria Sitompul, Risfidian Mohadi, Nurlisa Hidayati

Makara Journal of Technology

Thermal decomposition of fish bones to obtain calcium oxide (CaO) was conducted at various temperatures of 400, 500, 800, 900, 1000, and 1100 °C. The calcium oxide was then characterized using X-ray diffractometer, FTIR spectrophotometer, and SEM analysis. The calcium oxide obtained from the decomposition at 1000 °C was then used as a catalyst in the production of biodiesel from waste cooking oil. Diffraction pattern of the calcium oxide produced from decomposition at 1000 °C showed a pattern similar to that of the calcium oxide produced by the Joint Committee on Powder Diffraction Standard (JCDPS). The diffractions of 2q values …


Effect Of Milling On The Densification Of Sic-Basedcomposites From Polysilazane, Alfian Noviyanto, Toshiyuki Nishimura Dec 2016

Effect Of Milling On The Densification Of Sic-Basedcomposites From Polysilazane, Alfian Noviyanto, Toshiyuki Nishimura

Makara Journal of Technology

High density SiC-based composites from polysilazane were fabricated by high energy milling and hot pressing. After cross-linking at 200 °C, the polysilazane was pyrolysed at 1000 °C in N2 for 2 h to form amorphous Si-C-N-O followed by high energy milling for 1 h. Milled amorphous Si-C-N-O was sintered in hot pressing at 1600 and 1700 °C for 1 h in vacuum under the applied pressure of 50 MPa. Although no sintering additives were used, dense SiC-based composites were obtained with this method. Sintered density was 3.04 g/cm3, while only 2.57 g/cm3 for amorphous Si-C-N-O without milling. It is suggested …


Optimizing Supply Chain Collaboration Based On Agreement Buyer-Supplier Relationship With Network Design Problem, Wahyudi Sutopo, Ayu Erliza, Arien Heryansyah Dec 2016

Optimizing Supply Chain Collaboration Based On Agreement Buyer-Supplier Relationship With Network Design Problem, Wahyudi Sutopo, Ayu Erliza, Arien Heryansyah

Makara Journal of Technology

In recent years, the rising competitive environment with shorter product life cycles and high customization forces industries to increase their flexibility, speed up their response, and enhance concurrent engineering designs. To integrate these prospects, supply chain collaboration becomes a pertinent strategy for industries to strengthen their competitiveness. The network design problem is used to implement supply chain collaboration. In the buying and selling process, sharing information between buyer and supplier are important to obtain a transaction decision. The optimimum supply chain profit can be identified by mathematical model of network design problem. The Mathematical Model takes into consideration the uncertainity …


Expression And The Functional Study Of Fusion Proteins Α-Amylase And Hemolysin- Αas An Application In Biofilm Polysaccharide Degradation, Gede Yuda Sugiarta, Anggoro Wiseso, Siska Yuliana Sari, Etri Dian Kamila, Vanessa Geraldine, Diana Christina, Muhammad Hanifi, Dwiantari Satyapertiwi, Robby Hertanto, Budiman Bela, Masafumi Yohda, Muhamad Sahlan Dec 2016

Expression And The Functional Study Of Fusion Proteins Α-Amylase And Hemolysin- Αas An Application In Biofilm Polysaccharide Degradation, Gede Yuda Sugiarta, Anggoro Wiseso, Siska Yuliana Sari, Etri Dian Kamila, Vanessa Geraldine, Diana Christina, Muhammad Hanifi, Dwiantari Satyapertiwi, Robby Hertanto, Budiman Bela, Masafumi Yohda, Muhamad Sahlan

Makara Journal of Technology

Biofilm is an aggregate of consortium bacteria that adhere to each other on a surface. It is usually protected by the exopolysaccharide layer. Various invasive medical procedures, such as catheterization, endotracheal tube installation, and contact lens utilization, are vulnerable to biofilm infection. The National Institute of Health (NIH) estimates 65% of all microbial infections are caused by biofilm. Periplasmic α-amylase (MalS) is an enzyme that hydrolyzes α-1, 4- glicosidic bond in glycogen, starch, and others related polysaccharides in periplasmic space. Another protein called hemolysin-α (HlyA) is a secretion signal protein on C terminal of particular peptide in gram negative bacteria. …


Thermoeconomic Optimization Of Cascade Refrigeration System Using Mixed Carbon Dioxide And Hydrocarbons At Low Temperature Circuit, Nasruddin Nasruddin, Arnas Arnas, Ahmad Faqih, Niccolo Giannetti Dec 2016

Thermoeconomic Optimization Of Cascade Refrigeration System Using Mixed Carbon Dioxide And Hydrocarbons At Low Temperature Circuit, Nasruddin Nasruddin, Arnas Arnas, Ahmad Faqih, Niccolo Giannetti

Makara Journal of Technology

Many applications and industrial processes require very low cooling temperature, such as cold storage in the biomedical field, requiring temperature below -80 °C. However, single-cycle refrigeration systems can only achieve the effective cooling temperature of -40 °C and, also, the performance of the cycle will decrease drastically for cooling temperatures lower than -35°C. Currently, most of cascade refrigeration systems use refrigerants that have ozone depletion potential (ODP) and global warming potential (GWP), therefore, in this study, a cascade system is simulated using a mixture of environmentally friendly refrigerants, namely, carbon dioxide and a hydrocarbon (propane, ethane or ethylene) as the …


Design Of The Human Assembly Strategy In A Self-Optimizing Assembly Cell: A Case Study Of Indonesians, Novie Susanto, Ratna Purwaningsih, Kharisma Panca Kurniawati Dec 2016

Design Of The Human Assembly Strategy In A Self-Optimizing Assembly Cell: A Case Study Of Indonesians, Novie Susanto, Ratna Purwaningsih, Kharisma Panca Kurniawati

Makara Journal of Technology

This paper presents a continuing study of the human cognitive aspect application in the technical systems. The last studies design a human-centered design based on the German culture. The result shows a significant difference of human performance between Germans and Indonesians. Therefore, this study examines the human cognitive model based on Indonesian culture to investigate whether the different cognitive model based on the culture aspect can improve the human performance. The study was conducted on 60 people classified by age, young (16-34 years old) and old (older than 34 years old). Participants render predictions on an assembly activity for two …


Developing Road Infrastructure Route Planning: Increasing Feasibility Of Toll Road Project, Mohammed Ali Berawi, Teuku Yuri Zagloel, Perdana Miraj, Abdur Rohim Boy Berawi, Wellsi Titaheluw, Saipol Bari Bin Abd Karim Dec 2016

Developing Road Infrastructure Route Planning: Increasing Feasibility Of Toll Road Project, Mohammed Ali Berawi, Teuku Yuri Zagloel, Perdana Miraj, Abdur Rohim Boy Berawi, Wellsi Titaheluw, Saipol Bari Bin Abd Karim

Makara Journal of Technology

Indonesian government attempts to improve connectivity and to increase regional activities in Sumatera Island through the development of Trans Sumatera Toll Road (TSTR). However, despite its benefits to local economic development in Sumatera, the project shows low feasibility due to a low amount of investment. It can be attributed from the lack of planning in the initial phase to produce a comprehensive route that considers the various potentials of the regions. Thus, this research aims to investigate alternative route planning of Trans Sumatera Toll Road particularly in this paper for Central Sumatera by studying Gross Regional Domestic Product (GRDP), population …


Thermal And -Γ –Ray Irradiation Effects On The Ionic Conductivity Of (Licl)X(Montmorillonite)1-X, Safei Purnama, Aziz Khan Jahja, Takeshi Sakuma Dec 2016

Thermal And -Γ –Ray Irradiation Effects On The Ionic Conductivity Of (Licl)X(Montmorillonite)1-X, Safei Purnama, Aziz Khan Jahja, Takeshi Sakuma

Makara Journal of Technology

Compositesof montmorillonite (MMT) - lithium salts have been prepared using a simple process of powders mixing followed by heating. The powders resulting from this method are expected to beionic conductors with a high ionic conductivity characteristics. This characteristics is also further improved by employing gamma-ray irradiation technique at specified irradiation doses. The best results were obtained for the (LiCl)0.5(MMT)0.5 composite with a room temperature ionic conductivity of 2.192 mS/cm, which then increases to ~5 mS/cm after gamma irradiation at a dose of 400 kGy. This value is equivalent to the value of the ionic conductivity of current commercial rechargeable lithium …


Harmonic Scale Transformations, John H. Chalmers Nov 2016

Harmonic Scale Transformations, John H. Chalmers

The STEAM Journal

My artwork derives from a project to delineate the transformations certain types of harmonic musical scales undergo as the sizes of their generating intervals vary over the space of the octave.


Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon Nov 2016

Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon

Kansas Library Association College and University Libraries Section Proceedings

K-State Libraries have many complex digital workflows that involve multiple people and departments. One, in particular, had the ongoing issues of tracking different stages, individual responsibilities, information gathering, notifications, and uploads done manually. Due to the inefficiency that this caused, it led to the development of an open source workflow management system (WMS)


Jitim Volume 25 Issue 3 - Front Page Nov 2016

Jitim Volume 25 Issue 3 - Front Page

Journal of International Technology and Information Management

JITIM volume 25, issue 3


The Results Of Deliberation, Maggie Wittlin Nov 2016

The Results Of Deliberation, Maggie Wittlin

The University of New Hampshire Law Review

When evaluating whether to sue, prosecute, settle, or plead, trial lawyers must predict the future—they need to estimate how likely they are to win a given case in a given jurisdiction. Social scientists have used mock juror studies to produce a vast body of literature showing how different variables influence juror decision making. But few of these studies account for jury deliberation, so they present an impoverished picture of how these effects play out in trials and are of limited usefulness.

This Article helps lawyers better predict the future by presenting a novel computer model that extrapolates findings about jurors …


Unconventional Methods For A Traditional Setting: The Use Of Virtual Reality To Reduce Implicit Racial Bias In The Courtroom, Natalie Salmanowitz Nov 2016

Unconventional Methods For A Traditional Setting: The Use Of Virtual Reality To Reduce Implicit Racial Bias In The Courtroom, Natalie Salmanowitz

The University of New Hampshire Law Review

The presumption of innocence and the right to a fair trial lie at the core of the United States justice system. While existing rules and practices serve to uphold these principles, the administration of justice is significantly compromised by a covert but influential factor: namely, implicit racial biases. These biases can lead to automatic associations between race and guilt, as well as impact the way in which judges and jurors interpret information throughout a trial. Despite the well-documented presence of implicit racial biases, few steps have been taken to ameliorate the problem in the courtroom setting. This Article discusses the …


How Do Family Background And Self-Esteem Affect An Individual’S Perception Of Gender-Role Portrayal In Online Advertisements?, Cera T. Crowe, Aimee P. Meader Dr. Oct 2016

How Do Family Background And Self-Esteem Affect An Individual’S Perception Of Gender-Role Portrayal In Online Advertisements?, Cera T. Crowe, Aimee P. Meader Dr.

The Winthrop McNair Research Bulletin

The purpose of this study is to further understand the relationship of family background and how it affects self-esteem and the perception of gender roles in online imagery. This study focuses on how our history serves as a lens to see gender roles. The schema theory, created by Robert Axelrod, is a model suggesting that people have a “pre-existing assumption about the way the world is organized” (Axelford, 1974). Furthering this theory is Bem's (1981) Gender Schema Theory, which proposes that one's sexual self-concept affects how one structures items in memory. These theories, applied to the understood roles and activities …


Xml Schemas And Computer Language Copyright: Filling In The Blanks In Blank Esperanto, Douglas E. Phillips Oct 2016

Xml Schemas And Computer Language Copyright: Filling In The Blanks In Blank Esperanto, Douglas E. Phillips

Journal of Intellectual Property Law

No abstract provided.


Can Flight Data Recorder Memory Be Stored On The Cloud?, Yair Wiseman Oct 2016

Can Flight Data Recorder Memory Be Stored On The Cloud?, Yair Wiseman

Journal of Aviation Technology and Engineering

Flight data recorders (FDRs, or black boxes) generate data that is collected on an embedded memory device. A well-known difficulty with these devices is that the embedded memory device runs out of space. To avoid getting into this problematic situation, the software of the FDR is designed to operate in a watchful mode, constantly working to minimize the use of memory space; otherwise a larger FDR would be needed. However, larger FDRs can be a problem because they have very rigorous requirements; thus, enlargement is costly. Outcomes of this research include the recommendation to send FDR data to a remote …


Patent Reexamination Post Litigation: It's Time To Set The Rules Straight, Tremesha S. Willis Oct 2016

Patent Reexamination Post Litigation: It's Time To Set The Rules Straight, Tremesha S. Willis

Journal of Intellectual Property Law

No abstract provided.


Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang Oct 2016

Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang

Journal of International Technology and Information Management

With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …