Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

PDF

2006

Discipline
Keyword
Publication

Articles 1 - 25 of 25

Full-Text Articles in Computer Engineering

Approches Orientées Services Web De L'Ihm De Supervision : Nouvelles Solutions Technologiques Pour Les Ingénieurs Et Nouvelles Problématiques Pour Les Ergonomes ?, Djilali Idoughi, Christophe Kolski Sep 2006

Approches Orientées Services Web De L'Ihm De Supervision : Nouvelles Solutions Technologiques Pour Les Ingénieurs Et Nouvelles Problématiques Pour Les Ergonomes ?, Djilali Idoughi, Christophe Kolski

Professor Djilali IDOUGHI

RESUME Dans cet article, nous considérons l’IHM de supervision dans un contexte technologique nouveau et en constante évolution, lequel est caractérisé par des aspects impor-tants comme la mobilité et la coopération entre acteurs d’une part, et l’inter connectivité, l’interopérabilité et l’hétérogénéité des systèmes industriels utilisés d’autre part. De nouvelles solutions technologiques « attrayan-tes » pour les ingénieurs devraient conduire à de nouvel-les problématiques pour les ergonomes.


Inventions On Ldap Data Storage- A Study Based On Us Patents, Umakant Mishra Aug 2006

Inventions On Ldap Data Storage- A Study Based On Us Patents, Umakant Mishra

Umakant Mishra

Lightweight Directory Access Protocol (LDAP) is an IETF open standard to provide directory services in the network. LDAP was initially developed at the University of Michigan with an objective to include most of the features of X.500 directory structure, while eliminating the burdens and difficulties of the same.

As LDAP does not provide any specification on the data storage, different venders can implement different mechanism for data storage as found suitable to the specific vender or environment. Although underlying data storage system between different LDAP servers can differ, this disparity does not affect the functionality or interaction of LDAP clients. …


Inventions On Ldap Security- A Triz Based Analysis, Umakant Mishra Jul 2006

Inventions On Ldap Security- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The specifications of LDAP v.3 provide facilities for simple authentication using a cleartext password as well as any SASL mechanism.SASL allows for integrity and privacy services to be negotiated (RFC 2251, www.ietf.org/rfc/rfc2251.txt). Use of cleartext password is strongly discouraged where the underlying transport service cannot guarantee confidentiality and may result in disclosure of the password to unauthorized parties. The protocol allows other security mechanisms like SASL to be implemented in LDAP. The protocol also permits that the server can return its credentials to the client, if it chooses to do so. This article is a TRIZ based study on patents …


Inventions On Ldap- A Study Based On Us Patents, Umakant Mishra Jun 2006

Inventions On Ldap- A Study Based On Us Patents, Umakant Mishra

Umakant Mishra

Lightweight Directory Access Protocol (LDAP) is an IETF open standard to provide directory services in the network. LDAP is based on X.500 directory architecture, intended to provide directory services in Internet compatible environments. LDAP is used to provide directory services to applications ranging from e-mail systems to distributed system management tools. LDAP is becoming more and more popular with its wider usage in the Internet.

This report on LDAP is based on a study of 60 selected patents on LDAP from US patent database. The objective of this article is to present the distribution of patents according to different features …


Using Triz To Design The Future Keyboard, Umakant Mishra Feb 2006

Using Triz To Design The Future Keyboard, Umakant Mishra

Umakant Mishra

A keyboard is the most common and widely used input device for a computer. Using the keyboard is often vital to interact with a computer. There are several aspects of a keyboard such as size, key layout, convenience and ergonomic features etc., which are continuously under improvement by keyboard designers and manufacturers. TRIZ is an efficient methodology in product designing. Using IFR and Trends we can well predict the directions of the future keyboards and using Contradictions and Principles we can overcome the current limitations. This article analyses the critical features of a keyboard, does a functional analysis, derives the …


Case Study Amag - Reorganization Of Spare Parts Business, Enrico Senger Dec 2005

Case Study Amag - Reorganization Of Spare Parts Business, Enrico Senger

Enrico Senger

Swiss Volkswagen importer AMAG reorganized its spare parts supply process through a new method of collaboration between Volkswagen, AMAG’s central warehouse and regional warehouses, and service stations. From the service station spare parts orders via replenishment by the VW spare parts warehouse in Kassel (Germany) and by other sup-pliers, to Swiss customs, inventory levels in the central and regional warehouses, and the delivery to the service stations, the entire process utilizes the same database in real time. This enables AMAG to eliminate an existing sales and warehousing step and to manage the rapidly growing complexity of spare parts logistics resulting …


Towards New Web Services Based Supervisory Systems Dedicated To Nomadic Operators, Djilali Idoughi, Christophe Kolski Dec 2005

Towards New Web Services Based Supervisory Systems Dedicated To Nomadic Operators, Djilali Idoughi, Christophe Kolski

Professor Djilali IDOUGHI

This paper outlines new approaches and motivations about supervisory HMI, such as mobility and information access by different human actors belonging to the organization, by using diverse interaction devices, exploiting Web Services and their underlying technologies. The basic concepts are explained in the context of industrial supervision adopting a service oriented architecture (SOA) design approach which makes it possible to integrate real time information from different systems more easily than traditional ones. A representative supervisory scenario which illustrates the approach is described and discussed.


Chapter 7 Impact Of Interconnecting Issue Of Pv/Wes With Eu On Their Reliability Using A Fuzzy Scheme, Dr. Adel A. Elbaset Dec 2005

Chapter 7 Impact Of Interconnecting Issue Of Pv/Wes With Eu On Their Reliability Using A Fuzzy Scheme, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Chapter 5 Operation Control Strategy And Simulation Of Wtg Interconnected With Eu, Dr. Adel A. Elbaset Dec 2005

Chapter 5 Operation Control Strategy And Simulation Of Wtg Interconnected With Eu, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Chapter 4 Design Of Wes Interconnected With Eu, Dr. Adel A. Elbaset Dec 2005

Chapter 4 Design Of Wes Interconnected With Eu, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Definations, Dr. Adel A. Elbaset Dec 2005

Definations, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Abstract English, Dr. Adel A. Elbaset Dec 2005

Abstract English, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

Abstract of Ph. D. Thesis Study of Interconnecting Issues of Photovoltaic/Wind Hybrid System with Electric Utility Using Artificial Intelligence By Eng. Adel A. Elbaset Submitted to Electrical Engineering Dept., Faculty of Engineering, Elminia University The overall objective of PV and WES are to obtain electricity from the sun and wind that are cost competitive and even advantageous with respect to other energy sources. The global average insolation i.e. horizontal global and wind speed in Egypt are relatively good. The design of photovoltaic wind en¬ergy system hybrid power system (PV/WES HEPS) has many difficulties if we take all economical and technical …


Chapter 1 Introduction And Previous Work, Dr. Adel A. Elbaset Dec 2005

Chapter 1 Introduction And Previous Work, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Arabic Abstract, Dr. Adel A. Elbaset Dec 2005

Arabic Abstract, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

ملخص الرسالة "دراسة قضايا ربط نظام مختلط من منظومة فوتوفولتية و منظومة رياح مع شبكة كهربية بإستخدام الذكاء الاصطناعي" يشهد العالم إرتفاعاًَ ملحوظاَ في أسعار الوقود الحفري منذ نهاية القرن الماضي وحتي الاّن ، ويزداد هذا الإرتفاع والتناقص في المخزون يوماَ بعد يوم. ولهذا فقد إتجهت أنظار الباحثين في مجال توليد القدرة الكهربية إلي التوسع في إستغلال مصادر الطاقة الغير تقليدية وبصفة خاصة مصادر الطاقة الجديدة والمتجددة. وتعتبر الطاقة الجديدة والمتجددة من الطاقة التي لا تنضب بالاستخدام لأنها تعتمد علي مصادر طبيعية متجددة ، ومن أمثلة هذه المصادر الشمس، والرياح، والمد والجزر، حرارة باطن الأرض …………..الخ. ولقد أصبح استغلال هذه …


Examining Committee, Dr. Adel A. Elbaset Dec 2005

Examining Committee, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


References, Dr. Adel A. Elbaset Dec 2005

References, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


A_ Cover, Dr. Adel A. Elbaset Dec 2005

A_ Cover, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Contents, Dr. Adel A. Elbaset Dec 2005

Contents, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Computer Programs, Dr. Adel A. Elbaset Dec 2005

Computer Programs, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Chapter 8 Conclusions And Suggestions For Future Work, Dr. Adel A. Elbaset Dec 2005

Chapter 8 Conclusions And Suggestions For Future Work, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Chapter 3 Operation Control Strategy And Simulation Of Pv System Interconnected With Eu, Dr. Adel A. Elbaset Dec 2005

Chapter 3 Operation Control Strategy And Simulation Of Pv System Interconnected With Eu, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


Chapter 6 Design And Control Strategy Of Pv/Wes Heps Interconnected With Eu, Dr. Adel A. Elbaset Dec 2005

Chapter 6 Design And Control Strategy Of Pv/Wes Heps Interconnected With Eu, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

No abstract provided.


An Overview Of Mac Protocols With Directional Antennas In Wireless Ad Hoc Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2005

An Overview Of Mac Protocols With Directional Antennas In Wireless Ad Hoc Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

Although directional antennas have been used in mobile communications systems for quite a long time, realistic applications of directional or smart antennas in wireless ad hoc network have emerged just in recent years. Directional antennas provide numerous benefits, such as higher gains, increased transmission range and low interferences. Wireless medium access schemes play a crucial role in ensuring the efficient and fair sharing of wireless resources. Therefore there are many research work on mechanisms at the wireless medium access layer by using directional antennas. The new features of MAC with directional antennas can cause not only location dependent carrier sensing …


Mac Os X Forensics, Philip Craiger, Paul Burke Dec 2005

Mac Os X Forensics, Philip Craiger, Paul Burke

J. Philip Craiger, Ph.D.

This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.


Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger Dec 2005

Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger

J. Philip Craiger, Ph.D.

Secure deletion programs purport to permanently erase files from digital media. These programs are used by businesses and individuals to remove sensitive information from media, and by criminals to remove evidence of the tools or fruits of illegal activities. This paper focuses on the trace evidence left by secure deletion programs. In particular, five Windows-based secure deletion programs are tested to determine if they leave identifiable signatures after deleting a file. The results show that the majority of the programs leave identifiable signatures. Moreover, some of the programs do not completely erase file metadata, which enables forensic investigators to extract …