Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (428)
- Physical Sciences and Mathematics (405)
- Computer Sciences (404)
- Social and Behavioral Sciences (60)
- Law (37)
-
- Forensic Science and Technology (32)
- Legal Studies (32)
- Computer Law (31)
- Information Security (31)
- Digital Communications and Networking (26)
- Communication (25)
- Electrical and Electronics (25)
- Chemical Engineering (24)
- Civil Engineering (24)
- Civil and Environmental Engineering (24)
- Materials Science and Engineering (24)
- Mechanical Engineering (24)
- Metallurgy (24)
- Ocean Engineering (24)
- Structural Engineering (24)
- Data Storage Systems (22)
- Business (21)
- Communication Technology and New Media (21)
- Computer and Systems Architecture (20)
- Library and Information Science (20)
- Management Information Systems (20)
- Social Media (20)
- Technology and Innovation (20)
- Institution
-
- TÜBİTAK (372)
- Embry-Riddle Aeronautical University (31)
- Universitas Indonesia (24)
- California State University, San Bernardino (19)
- University of Georgia School of Law (3)
-
- Andrews University (2)
- Claremont Colleges (2)
- Universitas Negeri Yogyakarta (2)
- University of New Hampshire (2)
- Cleveland State University (1)
- DePaul University (1)
- Kansas State University Libraries (1)
- Liberty University (1)
- Macalester College (1)
- Maurer School of Law: Indiana University (1)
- Missouri University of Science and Technology (1)
- Old Dominion University (1)
- Purdue University (1)
- San Jose State University (1)
- The University of Akron (1)
- University of South Florida (1)
- WellBeing International (1)
- Winthrop University (1)
- Keyword
-
- Particle swarm optimization (13)
- Genetic algorithm (11)
- Optimization (10)
- Power quality (7)
- Renewable energy (6)
-
- Artificial neural network (5)
- Digital forensics (5)
- FPGA (5)
- Feature extraction (5)
- Fuzzy logic (5)
- Induction motor (5)
- Support vector machines (5)
- Computer forensics (4)
- Field-programmable gate array (4)
- Gravitational search algorithm (4)
- Maximum power point tracking (4)
- Multilevel inverter (4)
- Photovoltaic (4)
- Support vector machine (4)
- Wind energy (4)
- Wireless sensor networks (4)
- Classification (3)
- Data mining (3)
- Differential evolution (3)
- Efficiency (3)
- Feature selection (3)
- Image compression (3)
- Image processing (3)
- Induction generator (3)
- Linear programming (3)
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (372)
- Journal of Digital Forensics, Security and Law (31)
- Makara Journal of Technology (24)
- Journal of International Technology and Information Management (19)
- Journal of Intellectual Property Law (3)
-
- Andrews Agenda: Campus News (2)
- Elinvo (Electronics, Informatics, and Vocational Education) (2)
- The University of New Hampshire Law Review (2)
- Animal Sentience (1)
- Claremont-UC Undergraduate Research Conference on the European Union (1)
- In The Loop (1)
- Indiana Law Journal (1)
- Journal of Aviation Technology and Engineering (1)
- Kansas Library Association College and University Libraries Section Proceedings (1)
- Macalester Journal of Physics and Astronomy (1)
- Military Cyber Affairs (1)
- Missouri S&T’s Peer to Peer (1)
- Montview Journal of Research & Scholarship (1)
- Proceedings from the Document Academy (1)
- The Downtown Review (1)
- The STEAM Journal (1)
- The Winthrop McNair Research Bulletin (1)
- Themis: Research Journal of Justice Studies and Forensic Science (1)
- Virginia Journal of Science (1)
Articles 1 - 30 of 471
Full-Text Articles in Computer Engineering
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
Single Propeller Drone (Singrone): Inovasi Rancang Bangun Drone Single Propeller Sebagai Wahana Pemetaan Lahan Berbasis Unmaned Aerial Vehicle (Uav), Mohammad Giffari Anta Pradana
Single Propeller Drone (Singrone): Inovasi Rancang Bangun Drone Single Propeller Sebagai Wahana Pemetaan Lahan Berbasis Unmaned Aerial Vehicle (Uav), Mohammad Giffari Anta Pradana
Elinvo (Electronics, Informatics, and Vocational Education)
Dewasa ini, teknologi sebagai faktor memberikan kontribusi yang signifikan dalam peningkatan
kualitas hidup manusia. Salah satu teknologi yang berkembang saat ini adalah drone. Drone adalah
pesawat tanpa awak yang dikendalikan dengan sebuah remote control , di lengkapi dengan GPS sebagai
navigasi, dan lock position. Pada umumnya drone digunakan untuk berbagai hal, seperti pemantauan lalu
lintas, pemetaan lahan, investigasi dan sebagainya. Namun penggunaan drone dengan menggunakan
banyak propeller merupakan salah satu masalah penggunaan drone. Semakin banyak propeller yang
digunakan, maka masa hidup drone di udara juga akan semakin berkurang. Hal ini diarenakan baterai
yang digunakan oleh wahana tersebut banyak digunakan untuk …
Sistem Monitoring Pencemaran Polutan Kendaraan Via Gadget Berbasis Arduino, Adibatul Ardianto
Sistem Monitoring Pencemaran Polutan Kendaraan Via Gadget Berbasis Arduino, Adibatul Ardianto
Elinvo (Electronics, Informatics, and Vocational Education)
Sumber polusi udara salah satunya adalah gas buang kendaraan bermotor, gas yang dihasilkan dari pembakaran bahan bakar terjadi pada mesin kendaraan. Tingkat deteksi aplikasi dari sistem pembuangan kendaraan bermotor yang dibuat digunakan untuk mendeteksi jumlah kadar gas H2, gas EtOH dan gas CO dengan menggunakan sensor TGS2201. Data dari sensor diolah oleh arduino dan hasilnya ditampilkan pada PC melalui port serial, desain program aplikasi dengan menggunakan Bahasa C.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley
Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley
Military Cyber Affairs
Lexical Link Analysis (LLA) is a form of text mining in which word meanings represented in lexical terms (e.g., word pairs) are treated as if they are in a community of a word network. LLA can provide automated awareness for analyzing text data and reveal previously unknown, data-driven themed connections. We applied LLA to develop authentic archetypes and conversely determine potential imposters of that same archetype. We use publically available social media data to develop a cyber professional as an example. This paper reports the development of the algorithm, the collection and labeling of data, as well as the results …
Recent Semantic Changes For The Term "Digital", Tore Brattli
Recent Semantic Changes For The Term "Digital", Tore Brattli
Proceedings from the Document Academy
The term digital originates from the Latin word for finger/counting and has for many years been used to denote discrete signals and information, as opposed to analog. Discrete representation is an important principle, not only in computers, but also for (printed) text, music scores and even our genes. Recently however, the use of the term has increased and the meaning expanded to include almost everything related to information technology, e.g. digital natives and digital addiction. This study investigates the core principles of digital representation and compares this concept with the recent usage, with a focus on Norwegian media. The purpose …
Characterization And Utilization Of Calcium Oxide (Cao) Thermally Decomposed From Fish Bones As A Catalyst In The Production Of Biodiesel From Waste Cooking Oil, Aldes Lesbani, Sabat Okta Ceria Sitompul, Risfidian Mohadi, Nurlisa Hidayati
Characterization And Utilization Of Calcium Oxide (Cao) Thermally Decomposed From Fish Bones As A Catalyst In The Production Of Biodiesel From Waste Cooking Oil, Aldes Lesbani, Sabat Okta Ceria Sitompul, Risfidian Mohadi, Nurlisa Hidayati
Makara Journal of Technology
Thermal decomposition of fish bones to obtain calcium oxide (CaO) was conducted at various temperatures of 400, 500, 800, 900, 1000, and 1100 °C. The calcium oxide was then characterized using X-ray diffractometer, FTIR spectrophotometer, and SEM analysis. The calcium oxide obtained from the decomposition at 1000 °C was then used as a catalyst in the production of biodiesel from waste cooking oil. Diffraction pattern of the calcium oxide produced from decomposition at 1000 °C showed a pattern similar to that of the calcium oxide produced by the Joint Committee on Powder Diffraction Standard (JCDPS). The diffractions of 2q values …
Effect Of Milling On The Densification Of Sic-Basedcomposites From Polysilazane, Alfian Noviyanto, Toshiyuki Nishimura
Effect Of Milling On The Densification Of Sic-Basedcomposites From Polysilazane, Alfian Noviyanto, Toshiyuki Nishimura
Makara Journal of Technology
High density SiC-based composites from polysilazane were fabricated by high energy milling and hot pressing. After cross-linking at 200 °C, the polysilazane was pyrolysed at 1000 °C in N2 for 2 h to form amorphous Si-C-N-O followed by high energy milling for 1 h. Milled amorphous Si-C-N-O was sintered in hot pressing at 1600 and 1700 °C for 1 h in vacuum under the applied pressure of 50 MPa. Although no sintering additives were used, dense SiC-based composites were obtained with this method. Sintered density was 3.04 g/cm3, while only 2.57 g/cm3 for amorphous Si-C-N-O without milling. It is suggested …
Optimizing Supply Chain Collaboration Based On Agreement Buyer-Supplier Relationship With Network Design Problem, Wahyudi Sutopo, Ayu Erliza, Arien Heryansyah
Optimizing Supply Chain Collaboration Based On Agreement Buyer-Supplier Relationship With Network Design Problem, Wahyudi Sutopo, Ayu Erliza, Arien Heryansyah
Makara Journal of Technology
In recent years, the rising competitive environment with shorter product life cycles and high customization forces industries to increase their flexibility, speed up their response, and enhance concurrent engineering designs. To integrate these prospects, supply chain collaboration becomes a pertinent strategy for industries to strengthen their competitiveness. The network design problem is used to implement supply chain collaboration. In the buying and selling process, sharing information between buyer and supplier are important to obtain a transaction decision. The optimimum supply chain profit can be identified by mathematical model of network design problem. The Mathematical Model takes into consideration the uncertainity …
Expression And The Functional Study Of Fusion Proteins Α-Amylase And Hemolysin- Αas An Application In Biofilm Polysaccharide Degradation, Gede Yuda Sugiarta, Anggoro Wiseso, Siska Yuliana Sari, Etri Dian Kamila, Vanessa Geraldine, Diana Christina, Muhammad Hanifi, Dwiantari Satyapertiwi, Robby Hertanto, Budiman Bela, Masafumi Yohda, Muhamad Sahlan
Expression And The Functional Study Of Fusion Proteins Α-Amylase And Hemolysin- Αas An Application In Biofilm Polysaccharide Degradation, Gede Yuda Sugiarta, Anggoro Wiseso, Siska Yuliana Sari, Etri Dian Kamila, Vanessa Geraldine, Diana Christina, Muhammad Hanifi, Dwiantari Satyapertiwi, Robby Hertanto, Budiman Bela, Masafumi Yohda, Muhamad Sahlan
Makara Journal of Technology
Biofilm is an aggregate of consortium bacteria that adhere to each other on a surface. It is usually protected by the exopolysaccharide layer. Various invasive medical procedures, such as catheterization, endotracheal tube installation, and contact lens utilization, are vulnerable to biofilm infection. The National Institute of Health (NIH) estimates 65% of all microbial infections are caused by biofilm. Periplasmic α-amylase (MalS) is an enzyme that hydrolyzes α-1, 4- glicosidic bond in glycogen, starch, and others related polysaccharides in periplasmic space. Another protein called hemolysin-α (HlyA) is a secretion signal protein on C terminal of particular peptide in gram negative bacteria. …
Thermoeconomic Optimization Of Cascade Refrigeration System Using Mixed Carbon Dioxide And Hydrocarbons At Low Temperature Circuit, Nasruddin Nasruddin, Arnas Arnas, Ahmad Faqih, Niccolo Giannetti
Thermoeconomic Optimization Of Cascade Refrigeration System Using Mixed Carbon Dioxide And Hydrocarbons At Low Temperature Circuit, Nasruddin Nasruddin, Arnas Arnas, Ahmad Faqih, Niccolo Giannetti
Makara Journal of Technology
Many applications and industrial processes require very low cooling temperature, such as cold storage in the biomedical field, requiring temperature below -80 °C. However, single-cycle refrigeration systems can only achieve the effective cooling temperature of -40 °C and, also, the performance of the cycle will decrease drastically for cooling temperatures lower than -35°C. Currently, most of cascade refrigeration systems use refrigerants that have ozone depletion potential (ODP) and global warming potential (GWP), therefore, in this study, a cascade system is simulated using a mixture of environmentally friendly refrigerants, namely, carbon dioxide and a hydrocarbon (propane, ethane or ethylene) as the …
Design Of The Human Assembly Strategy In A Self-Optimizing Assembly Cell: A Case Study Of Indonesians, Novie Susanto, Ratna Purwaningsih, Kharisma Panca Kurniawati
Design Of The Human Assembly Strategy In A Self-Optimizing Assembly Cell: A Case Study Of Indonesians, Novie Susanto, Ratna Purwaningsih, Kharisma Panca Kurniawati
Makara Journal of Technology
This paper presents a continuing study of the human cognitive aspect application in the technical systems. The last studies design a human-centered design based on the German culture. The result shows a significant difference of human performance between Germans and Indonesians. Therefore, this study examines the human cognitive model based on Indonesian culture to investigate whether the different cognitive model based on the culture aspect can improve the human performance. The study was conducted on 60 people classified by age, young (16-34 years old) and old (older than 34 years old). Participants render predictions on an assembly activity for two …
Developing Road Infrastructure Route Planning: Increasing Feasibility Of Toll Road Project, Mohammed Ali Berawi, Teuku Yuri Zagloel, Perdana Miraj, Abdur Rohim Boy Berawi, Wellsi Titaheluw, Saipol Bari Bin Abd Karim
Developing Road Infrastructure Route Planning: Increasing Feasibility Of Toll Road Project, Mohammed Ali Berawi, Teuku Yuri Zagloel, Perdana Miraj, Abdur Rohim Boy Berawi, Wellsi Titaheluw, Saipol Bari Bin Abd Karim
Makara Journal of Technology
Indonesian government attempts to improve connectivity and to increase regional activities in Sumatera Island through the development of Trans Sumatera Toll Road (TSTR). However, despite its benefits to local economic development in Sumatera, the project shows low feasibility due to a low amount of investment. It can be attributed from the lack of planning in the initial phase to produce a comprehensive route that considers the various potentials of the regions. Thus, this research aims to investigate alternative route planning of Trans Sumatera Toll Road particularly in this paper for Central Sumatera by studying Gross Regional Domestic Product (GRDP), population …
Thermal And -Γ –Ray Irradiation Effects On The Ionic Conductivity Of (Licl)X(Montmorillonite)1-X, Safei Purnama, Aziz Khan Jahja, Takeshi Sakuma
Thermal And -Γ –Ray Irradiation Effects On The Ionic Conductivity Of (Licl)X(Montmorillonite)1-X, Safei Purnama, Aziz Khan Jahja, Takeshi Sakuma
Makara Journal of Technology
Compositesof montmorillonite (MMT) - lithium salts have been prepared using a simple process of powders mixing followed by heating. The powders resulting from this method are expected to beionic conductors with a high ionic conductivity characteristics. This characteristics is also further improved by employing gamma-ray irradiation technique at specified irradiation doses. The best results were obtained for the (LiCl)0.5(MMT)0.5 composite with a room temperature ionic conductivity of 2.192 mS/cm, which then increases to ~5 mS/cm after gamma irradiation at a dose of 400 kGy. This value is equivalent to the value of the ionic conductivity of current commercial rechargeable lithium …
Harmonic Scale Transformations, John H. Chalmers
Harmonic Scale Transformations, John H. Chalmers
The STEAM Journal
My artwork derives from a project to delineate the transformations certain types of harmonic musical scales undergo as the sizes of their generating intervals vary over the space of the octave.
Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon
Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon
Kansas Library Association College and University Libraries Section Proceedings
K-State Libraries have many complex digital workflows that involve multiple people and departments. One, in particular, had the ongoing issues of tracking different stages, individual responsibilities, information gathering, notifications, and uploads done manually. Due to the inefficiency that this caused, it led to the development of an open source workflow management system (WMS)
Jitim Volume 25 Issue 3 - Front Page
Jitim Volume 25 Issue 3 - Front Page
Journal of International Technology and Information Management
JITIM volume 25, issue 3
The Results Of Deliberation, Maggie Wittlin
The Results Of Deliberation, Maggie Wittlin
The University of New Hampshire Law Review
When evaluating whether to sue, prosecute, settle, or plead, trial lawyers must predict the future—they need to estimate how likely they are to win a given case in a given jurisdiction. Social scientists have used mock juror studies to produce a vast body of literature showing how different variables influence juror decision making. But few of these studies account for jury deliberation, so they present an impoverished picture of how these effects play out in trials and are of limited usefulness.
This Article helps lawyers better predict the future by presenting a novel computer model that extrapolates findings about jurors …
Unconventional Methods For A Traditional Setting: The Use Of Virtual Reality To Reduce Implicit Racial Bias In The Courtroom, Natalie Salmanowitz
Unconventional Methods For A Traditional Setting: The Use Of Virtual Reality To Reduce Implicit Racial Bias In The Courtroom, Natalie Salmanowitz
The University of New Hampshire Law Review
The presumption of innocence and the right to a fair trial lie at the core of the United States justice system. While existing rules and practices serve to uphold these principles, the administration of justice is significantly compromised by a covert but influential factor: namely, implicit racial biases. These biases can lead to automatic associations between race and guilt, as well as impact the way in which judges and jurors interpret information throughout a trial. Despite the well-documented presence of implicit racial biases, few steps have been taken to ameliorate the problem in the courtroom setting. This Article discusses the …
How Do Family Background And Self-Esteem Affect An Individual’S Perception Of Gender-Role Portrayal In Online Advertisements?, Cera T. Crowe, Aimee P. Meader Dr.
How Do Family Background And Self-Esteem Affect An Individual’S Perception Of Gender-Role Portrayal In Online Advertisements?, Cera T. Crowe, Aimee P. Meader Dr.
The Winthrop McNair Research Bulletin
The purpose of this study is to further understand the relationship of family background and how it affects self-esteem and the perception of gender roles in online imagery. This study focuses on how our history serves as a lens to see gender roles. The schema theory, created by Robert Axelrod, is a model suggesting that people have a “pre-existing assumption about the way the world is organized” (Axelford, 1974). Furthering this theory is Bem's (1981) Gender Schema Theory, which proposes that one's sexual self-concept affects how one structures items in memory. These theories, applied to the understood roles and activities …
Xml Schemas And Computer Language Copyright: Filling In The Blanks In Blank Esperanto, Douglas E. Phillips
Xml Schemas And Computer Language Copyright: Filling In The Blanks In Blank Esperanto, Douglas E. Phillips
Journal of Intellectual Property Law
No abstract provided.
Can Flight Data Recorder Memory Be Stored On The Cloud?, Yair Wiseman
Can Flight Data Recorder Memory Be Stored On The Cloud?, Yair Wiseman
Journal of Aviation Technology and Engineering
Flight data recorders (FDRs, or black boxes) generate data that is collected on an embedded memory device. A well-known difficulty with these devices is that the embedded memory device runs out of space. To avoid getting into this problematic situation, the software of the FDR is designed to operate in a watchful mode, constantly working to minimize the use of memory space; otherwise a larger FDR would be needed. However, larger FDRs can be a problem because they have very rigorous requirements; thus, enlargement is costly. Outcomes of this research include the recommendation to send FDR data to a remote …
Patent Reexamination Post Litigation: It's Time To Set The Rules Straight, Tremesha S. Willis
Patent Reexamination Post Litigation: It's Time To Set The Rules Straight, Tremesha S. Willis
Journal of Intellectual Property Law
No abstract provided.
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Journal of International Technology and Information Management
With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …