Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (427)
- Computer Sciences (424)
- Electrical and Computer Engineering (414)
- Social and Behavioral Sciences (408)
- Information Security (406)
-
- Law (397)
- Computer Law (396)
- Forensic Science and Technology (394)
- Legal Studies (394)
- Digital Communications and Networking (36)
- Aerospace Engineering (30)
- Other Computer Engineering (29)
- Robotics (27)
- Computer and Systems Architecture (25)
- Aviation (13)
- Hardware Systems (12)
- Data Storage Systems (11)
- Systems and Communications (10)
- Business (9)
- Navigation, Guidance, Control and Dynamics (9)
- Operations Research, Systems Engineering and Industrial Engineering (9)
- Psychology (9)
- Artificial Intelligence and Robotics (8)
- Mechanical Engineering (8)
- Aviation Safety and Security (7)
- Aeronautical Vehicles (6)
- Education (6)
- Multi-Vehicle Systems and Air Traffic Control (6)
- Keyword
-
- Digital forensics (33)
- Computer forensics (18)
- Digital Forensics (15)
- Digital evidence (13)
- Forensics (13)
-
- Computer Forensics (9)
- Information security (9)
- Cybersecurity (8)
- Privacy (8)
- Data recovery (6)
- Internet (6)
- Cyber crime (5)
- Cyber security (5)
- Data disposal (5)
- Disk analysis (5)
- Security (5)
- Visualization (5)
- Android (4)
- Automation (4)
- Computer security (4)
- Control (4)
- Cyber forensics (4)
- Cybercrime (4)
- Digital Examiner (4)
- Evidence (4)
- Investigation (4)
- Malware (4)
- Mobile device forensics (4)
- Private Investigator (4)
- State Statutes (4)
- Publication Year
- Publication
-
- Journal of Digital Forensics, Security and Law (299)
- Annual ADFSL Conference on Digital Forensics, Security and Law (105)
- Publications (41)
- Doctoral Dissertations and Master's Theses (27)
- Student Works (9)
-
- Department of Electrical Engineering and Computer Science - Daytona Beach (6)
- International Bulletin of Political Psychology (6)
- International Journal of Aviation, Aeronautics, and Aerospace (4)
- Master's Theses - Daytona Beach (4)
- National Training Aircraft Symposium (NTAS) (4)
- Space Traffic Management Conference (4)
- Security Studies & International Affairs - Daytona Beach (3)
- Undergraduate Research Symposium - Prescott (3)
- Discovery Day - Prescott (2)
- Human Factors and Applied Psychology Student Conference (2)
- Journal of Aviation/Aerospace Education & Research (2)
- Publication Type
- File Type
Articles 511 - 521 of 521
Full-Text Articles in Computer Engineering
Robust Control Techniques For State Tracking In The Presence Of Variable Time Delays, Jarrett Goodell, Marc Compere, Miguel Simon, Wilford Smith, Ronnie Wright, Mark Brudnak
Robust Control Techniques For State Tracking In The Presence Of Variable Time Delays, Jarrett Goodell, Marc Compere, Miguel Simon, Wilford Smith, Ronnie Wright, Mark Brudnak
Publications
In this paper, a distributed driver-in-the-Ioop and hardware-in-the-Ioop simulator is described with a driver on a motion simulator at the U.S. Army TARDEC Ground Vehicle Simulation Laboratory (GVSL). Realistic power system response is achieved by linking the driver in the GVSL with a full-sized hybrid electric power system located 2,450 miles away at the TARDEC Power and Energy Systems Integration Laboratory (P&E SIL), which is developed and maintained by Science Applications International Corporation (SAIC). The goal is to close the loop between the GVSL and P&E SIL over the Internet to provide a realistic driving experience in addition to realistic …
Trends. War On Personality And Personality And War: Comments On Nass And Lee (2002), Ibpp Editor
Trends. War On Personality And Personality And War: Comments On Nass And Lee (2002), Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses another article – Identity and deconstruction, by Clifford Nass and Kwan Min Yee – published in volume 3 (2002) of Archives of Psychiatry & Psychotherapy in which the authors demonstrate that people reliably attribute personality characteristics to computer-synthesized speech, exploring the ramifications in a political psychological context.
Computer Forensics: The Issues And Current Books In The Field, Gary C. Kessler, Michael Schirling
Computer Forensics: The Issues And Current Books In The Field, Gary C. Kessler, Michael Schirling
Publications
Computer crime investigation is a multidisciplinary profession and almost no one today has been trained purely as a computer forensic analyst. Toward that end, investigators need professional reference guides and texts that cover the major points of computer forensics. In this article, we discuss some broad issues related to forensic computing and include a review of four texts on the subject:
- Computer Forensics: Incident Response Essentials, Warren G. Kruse II & Jay G. Heiser
- Computer Forensics & Privacy, Michael Caloyannides
- Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, edited by Albert J. …
The Effect Of Target Position And Tactual Recognition Field Size On Touch Bias And Accuracy, Elizabeth L. Brix
The Effect Of Target Position And Tactual Recognition Field Size On Touch Bias And Accuracy, Elizabeth L. Brix
Master's Theses - Daytona Beach
Past studies have shown that touchscreen display angles other than those that perpendicularly bisect the operator's line of sight cause the operator to touch slightly below the target. The amount of touch bias created from this misjudgment fluctuates according to the target's position on the screen. Additionally, the percentage of touches that activate a specific target varies according to the size of the tactual recognition field. Out of three square tactual recognition field sizes, this study sought to match these fields with the amount of touch bias occurring in each location (i.e., small amount of touch bias requires only a …
The Other Information Warfare: A Mind Full Of Macedonia, Ibpp Editor
The Other Information Warfare: A Mind Full Of Macedonia, Ibpp Editor
International Bulletin of Political Psychology
This article highlights ongoing aspects of psychological warfare in Macedonia between government and rebel forces.
Cyberpsychology And Virtual Reality: Is An Update Necessary, Ibpp Editor
Cyberpsychology And Virtual Reality: Is An Update Necessary, Ibpp Editor
International Bulletin of Political Psychology
This article explores the notion that something called "human nature" may be changing in an era of significant information technology developments.
A Political Psychological Primer Of Virtual Reality Sequelae For Mental Health Professionals, Ibpp Editor
A Political Psychological Primer Of Virtual Reality Sequelae For Mental Health Professionals, Ibpp Editor
International Bulletin of Political Psychology
This paper describes a number of sequelae stemming from virtual reality (VR) and VR technology (VRT) based on theoretical and empirical research in the behavioral sciences, social sciences, humanities.
Trends. Supercomputer Sales And Nuclear Proliferation: The Surrealist Top Ten, Ibpp Editor
Trends. Supercomputer Sales And Nuclear Proliferation: The Surrealist Top Ten, Ibpp Editor
International Bulletin of Political Psychology
The author discusses supercomputers in conjunction with nuclear weapons.
A Computer-Aided Software Engineering (Case) Approach To Business Process Reengineering (Bpr), Faiza I. Khan
A Computer-Aided Software Engineering (Case) Approach To Business Process Reengineering (Bpr), Faiza I. Khan
Master's Theses - Daytona Beach
This thesis addresses the problem of lack of procedures by which managers can identify business processes that would benefit from reengineering and which could be used to guide the BPR activity to its successful conclusion. The purpose of this study is to analyze various Software Engineering (SE) principles to determine whether they could be used to support Business Process Reengineering (BPR) activities either directly or with some modification, and if so, whether available Computer-Aided Software Engineering (CASE) tools might be applied to BPR in support of managers who wish to implement it. The principles of SE and BPR are discussed …
Investigation And Evaluation Of A Computer Program To Minimize Vfr Flight Planning Errors, Peter Joseph Mcalindon
Investigation And Evaluation Of A Computer Program To Minimize Vfr Flight Planning Errors, Peter Joseph Mcalindon
Master's Theses - Daytona Beach
The purpose of this study was to investigate the effect of computer aided flight planning on flight planning errors. Subjects were selected from the introductory flight courses at Embry-Riddle Aeronautical University. After the subjects completed a conventional VFR navigation log, they were asked to plan the return trip of the flight using a computer aided flight plan. It was initially expected that the computer aided flight plans would have fewer flight planning errors than those calculated using conventional methods. The results supported the hypothesis that flight planning errors are greatly reduced when computer aided flight planning techniques are used.
The Development Of Speech Research Tools On Mit's Lisp Machine-Based Workstations, D. Scott Cyphers, Robert H. Kassel, David H. Kaufman, Hong C. Leung, Mark A. Randolph, Stephanie Seneff, John E. Unverferth Iii, Timothy Wilson, Victor W. Zue
The Development Of Speech Research Tools On Mit's Lisp Machine-Based Workstations, D. Scott Cyphers, Robert H. Kassel, David H. Kaufman, Hong C. Leung, Mark A. Randolph, Stephanie Seneff, John E. Unverferth Iii, Timothy Wilson, Victor W. Zue
Publications
In recent years, a number of useful speech- and language-related research tools have been under development at MIT. These tools are aids for efficiently analyzing the acoustic characteristics of speech and the phonological properties of a language. They are playing a valuable role in our own research, as well as in research conducted elsewhere. This paper describes several of the systems being developed for use on our Lisp Machine workstations.