Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Using T-Distributed Stochastic Neighbor Embedding For Visualization And Segmentation Of 3d Point Clouds Of Plants, Heli̇n Dutağaci Sep 2023

Using T-Distributed Stochastic Neighbor Embedding For Visualization And Segmentation Of 3d Point Clouds Of Plants, Heli̇n Dutağaci

Turkish Journal of Electrical Engineering and Computer Sciences

In this work, the use of t-SNE is proposed to embed 3D point clouds of plants into 2D space for plant characterization. It is demonstrated that t-SNE operates as a practical tool to flatten and visualize a complete 3D plant model in 2D space. The perplexity parameter of t-SNE allows 2D rendering of plant structures at various organizational levels. Aside from the promise of serving as a visualization tool for plant scientists, t-SNE also provides a gateway for processing 3D point clouds of plants using their embedded counterparts in 2D. In this paper, simple methods were proposed to perform semantic …


A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald Mar 2017

A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald

Journal of Digital Forensics, Security and Law

Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …


Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera Jan 2016

Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera

Journal of Digital Forensics, Security and Law

Drives found during investigations often have useful information in the form of email addresses which can be acquired by search in the raw drive data independent of the file system. Using this data we can build a picture of the social networks that a drive owner participated in, even perhaps better than investigating their online profiles maintained by social-networking services because drives contain much data that users have not approved for public display. However, many addresses found on drives are not forensically interesting, such as sales and support links. We developed a program to filter these out using a Naïve …


Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle Jan 2013

Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle Jan 2013

Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Plant Growth Modeling Using L-System Approach And Its Visualization, Atris Suyantohadi, Alfiyan Alfiyan, Mochamad Hariadi, Mauridhi Hery Purnomo Nov 2010

Plant Growth Modeling Using L-System Approach And Its Visualization, Atris Suyantohadi, Alfiyan Alfiyan, Mochamad Hariadi, Mauridhi Hery Purnomo

Makara Journal of Technology

The visualization of plant growth modeling using computer simulation has rarely been conducted with Lindenmayer System (L-System) approach. L-System generally has been used as framework for improving and designing realistic modeling on plant growth. It is one kind of tools for representing plant growth based on grammar sintax and mathematic formulation. This research aimed to design modeling and visualizing plant growth structure generated using L-System. The environment on modeling design used three dimension graphic on standart OpenGL format. The visualization on system design has been developed by some of L-System grammar, and the output graphic on three dimension reflected on …


Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli Jan 2009

Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli

Journal of Digital Forensics, Security and Law

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.


A Labview-Based Virtual Instrument For Engineering Education: A Numerical Fourier Transform Tool, Levent Sevgi̇, Çağatay Uluişik Jan 2006

A Labview-Based Virtual Instrument For Engineering Education: A Numerical Fourier Transform Tool, Levent Sevgi̇, Çağatay Uluişik

Turkish Journal of Electrical Engineering and Computer Sciences

Engineering is based on practice. The minima of this practice should be given during the university education. This has become more and more comprehensive and expensive parallel to high-technology devices developed and presented to societies. Computers, microprocessor-based devices, programmable systems on Chip (PSoC), etc., make engineering education not only very complex but interdisciplinary as well. Building undergraduate labs has become more and more expensive if only physical experimentation and hands-on training are targeted. On the other hand, simple, comparatively much cheaper software may turn a regular personal computer (PC) into a virtual lab. The key question therefore is, to establish …