Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Journal

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 63

Full-Text Articles in Computer Engineering

Isolation Of Methyl Laurate From Coconut Oil As Raw Material For Fatty Alcohol Sulfate, Rita Arbianti, Tania Surya Utami, Astri Nugroho Nov 2008

Isolation Of Methyl Laurate From Coconut Oil As Raw Material For Fatty Alcohol Sulfate, Rita Arbianti, Tania Surya Utami, Astri Nugroho

Makara Journal of Technology

Isolation of Methyl Laurate from Coconut Oil as Raw Material for Fatty Alcohol Sulfate. Methyl laurate is a raw or base material for many industries, including surfactant industries. In this research, coconut oil (VCO) is transesterified with methanol to produce methyl ester, using NaOH as the catalyst. Methyl laurate is then separated by method based on the difference in melting point. This research focuses at determining the effects of some variables in transesterification on the concentration of produced methyl laurate. The variables are temperature (40 oC, 50 oC, 60 oC, 80 oC), time of transesterification reaction (0,5 hour, 1 hour, …


Two Element Microstrip Antenna Array With Defected Ground Structure, Fitri Yuli Zulkifli, Eko Tjipto Rahardjo, Muhamad Asvial, Djoko Hartanto Nov 2008

Two Element Microstrip Antenna Array With Defected Ground Structure, Fitri Yuli Zulkifli, Eko Tjipto Rahardjo, Muhamad Asvial, Djoko Hartanto

Makara Journal of Technology

Two Element Microstrip Antenna Array with Defected Ground Structure. This paper presents a two element microstrip antenna array using trapezium shape defected ground structure (DGS). The DGS is inserted in the ground plane between two elements of antenna array. Insertion of the DGS is intended to suppress the mutual coupling effect produced by antenna array. Simulation and measurement results were taken and compared between antenna array with and without DGS. Measurement results show that the antenna with DGS compared to antenna without DGS can suppress mutual coupling effect to 7.9 dB, improve the return loss to 33.29% from -30.188 dB …


Physical Characteristics And Utilization Oft The Karst Beaches In Kabupaten Gunungkidul, Astrid Damayanti, Ranum Ayuningtyas Nov 2008

Physical Characteristics And Utilization Oft The Karst Beaches In Kabupaten Gunungkidul, Astrid Damayanti, Ranum Ayuningtyas

Makara Journal of Technology

Physical Characteristics and Utilization oft the Karst Beaches in Kabupaten Gunungkidul. Karsts beaches at Gunungkidul Regency (Baron, Kukup, Sepanjang, Drini, Krakal, Ngandong, and Sundak), located in south of Daerah Istimewa Yogyakarta Province, have economic potential. Even they have similarity in geological condition (genesis and morphological processes), but they have different physical characteristics. Based on result of observation environment on morphological conditions and spatial analysis method, we found the proper utilization of the beaches.


Spectral Response Surfaces And The Ringing Response Of Offshore Structures, I Ketut Suastika Nov 2008

Spectral Response Surfaces And The Ringing Response Of Offshore Structures, I Ketut Suastika

Makara Journal of Technology

A method, called spectral response surface method, is proposed for the study of the ringing phenomenon of offshore structures. Newman’s results for diffraction force on a column were reformulated in terms of the frequency components of the ocean surface and their Hilbert transforms. Using a first-order reliability method together with a dynamic model for the structural response, it is straightforward to calculate the ocean surface history most likely to generate an extreme ringing response and the ringing response history.


Neutron Irradiation On Ss316 Material For Radioactive Endovascular Stent Production, Rohadi Awaludin, Abidin Abidin, Sriyono Sriyono Nov 2008

Neutron Irradiation On Ss316 Material For Radioactive Endovascular Stent Production, Rohadi Awaludin, Abidin Abidin, Sriyono Sriyono

Makara Journal of Technology

Neutron Irradiation on SS316 Material for Radioactive Endovascular Stent Production. It was reported that restenosis could be prevented by radioactive endovascular stent. SS316 material of endovascular stent has been irradiated at pneumatic rabbit system of G.A. Siwabessy reactor for 5 minutes for producing radioactive stent by neutron activation. After 10 days of decay, the irradiated SS316 was measured by gamma spectrometer. The radioisotopes of 51Cr, 59Fe and 60Co were detected in the irradiated SS316 with radioactivity of 5990, 107 and 109 Bq/mg respectively. The Calculation results showed that radioisotopes of 51Cr, 59Fe and 55Fe were produced by neutron activation. The …


Phase Unwrapping Insar Image Using Local Energy Minimization Approach, Kusworo Adi, Tati L.R. Mengko, Andriyan B. Suksmono, Hendra Gunawan Nov 2008

Phase Unwrapping Insar Image Using Local Energy Minimization Approach, Kusworo Adi, Tati L.R. Mengko, Andriyan B. Suksmono, Hendra Gunawan

Makara Journal of Technology

Phase Unwrapping InSAR Image Using Local Energy Minimization Approach. Reconstruction process of phase data from its cover is called Phase Unwrapping (PU). Ideally, without any noise phrase, singularity, and aliasing problems, the phase information can be unwrapped easily. However, in fact, the phase data actually always get noise disturbance and discontinuity. The PU process becomes more complicated and needs a better PU algorithm to address the problems properly. In this research, the local PU algorithm is developed using minimization of close related firstorder pixels energy approach. In this method, the energy difference between four close related pixels is counted, followed …


Hydrogen Absorption In Weldments Of Overlaid Claded Pressure Vessel, Ronnie Higuchi Rusli Nov 2008

Hydrogen Absorption In Weldments Of Overlaid Claded Pressure Vessel, Ronnie Higuchi Rusli

Makara Journal of Technology

Cracks was found in type 347 stainless steel internal attachment welds of a reactor for a high temperature, and high pressure hydrogen service. One of the possible causes of cracking is low cycle fatigue cracking induced by repetition of thermal stress to embrittled weld metal. Type 347 weld metal loses its ductility by presence of sigma phase and hydrogen.


The Decompositioning Of Volatile-Matter Of Tanjung Enim Coal By Using Thermogravimetry Analyzer (Tga), Nukman Nukman Nov 2008

The Decompositioning Of Volatile-Matter Of Tanjung Enim Coal By Using Thermogravimetry Analyzer (Tga), Nukman Nukman

Makara Journal of Technology

The Decompositioning of Volatile-Matter of Tanjung Enim Coal by using Thermogravimetry Analyzer (TGA). Coal is a nature material which a kind of energy source. The decompotition of coal could analyze by heat treated using thermogravimetry analyzer. The decomposition of the volatile matter for three kinds of Tanjung Enim coal could be known. The value of activation energy that be found diference, then for Semi Anthracite, Bitumonius and Sub Bituminous Coal, the initial temperatures are 60.8 oC, 70.7 oC, 97.8oC, and the last temperatures are 893.8 oC, 832 oC, 584.6oC.


The Effect Of Ozone And Zeolite Concentration To The Performance Of The Treatment Of Wastewater Containing Heavy Metal Using Flotation Process, Eva Fathul Karamah, Setijo Bismo, Hotdi M. Simbolon Apr 2008

The Effect Of Ozone And Zeolite Concentration To The Performance Of The Treatment Of Wastewater Containing Heavy Metal Using Flotation Process, Eva Fathul Karamah, Setijo Bismo, Hotdi M. Simbolon

Makara Journal of Technology

The Effect of Ozone and Zeolite Concentration to the Performance of the Treatment of Wastewater Containing Heavy Metal Using Flotation Process. Industrial wastewater which contains heavy metal cannot be disposed to the environment directly, due to its toxicity. In this research, separation of metal from wastewater was conducted by sorptive flotation method, using Lampung natural zeolite as bonding agent. The most common diffuser used in the flotation process is air or oxygen. In this research, ozone is used as diffuser because it is a stronger oxidant and more dissolvable in water than oxygen. Besides, ozone is a coagulant aid and …


The Development Of Inverter Fuzzy Logic Control For Induction Motor Control By Vector Control Method In Electric Vehicle, Era Purwanto, Mohammad Ashary, Subagio Subagio, Mauridhi Heri Purnomo Apr 2008

The Development Of Inverter Fuzzy Logic Control For Induction Motor Control By Vector Control Method In Electric Vehicle, Era Purwanto, Mohammad Ashary, Subagio Subagio, Mauridhi Heri Purnomo

Makara Journal of Technology

The development of Inverter Fuzzy Logic Control for Induction Motor Control by Vector Control Method in Electric Vehicle. In response to concerns about energy cost, energy dependence, and environmental damage, a rekindling of interest in electric vehicles (EV’s) has been obvious. Thus, the development of power electronics technology for EV’s will take an accelerated pace to fulfill the market needs, regarding with the problem in this paper is presented development of fuzzy logic inverter in induction motor control for electric vehicle propulsion. The Fuzzy logic inverter is developed in this system to directed toward developing an improved propulsion system for …


Ad Hoc On-Demand Distance Vector (Aodv) Routing Protocol Performance Evaluation On Hybrid Ad Hoc Network: Comparison Of Result Of Ns-2 Simulation And Implementation On Testbed Using Pda, Riri Fitri Sari, Abdusy Syarif, Bagio Budiardjo Apr 2008

Ad Hoc On-Demand Distance Vector (Aodv) Routing Protocol Performance Evaluation On Hybrid Ad Hoc Network: Comparison Of Result Of Ns-2 Simulation And Implementation On Testbed Using Pda, Riri Fitri Sari, Abdusy Syarif, Bagio Budiardjo

Makara Journal of Technology

Ad Hoc on-Demand Distance Vector (AODV) Routing Protocol Performance Evaluation on Hybrid Ad Hoc Network: Comparison of Result of Ns-2 Simulation and Implementation on Testbed using PDA. In Mobile Ad hoc NETwork (MANET), node supplemented with wireless equipment has the capacity to manage and organise autonomously, without the presence of network infrastructures. Hybrid ad hoc network, enable several nodes to move freely (mobile) to create instant communication. Independent from infrastructure. They could access the Local Area Network (LAN) or the Internet. Functionalities of ad hoc network very much dependent on the routing protocol that determines the routing around node. Ad …


Internet Congestion Control System, Pranoto Hidaya Rusmin, Carmadi Machbub, Agung Harsoyo, Hendrawan Hendrawan Apr 2008

Internet Congestion Control System, Pranoto Hidaya Rusmin, Carmadi Machbub, Agung Harsoyo, Hendrawan Hendrawan

Makara Journal of Technology

Internet Congestion Control System. Internet congestion occurs when resource demands exceeds the network capacity. But, it is not the only reason. Congestion can happen on some users because some others user has higher sending rate. Then some users with lower sending rate will experience congestion. This partial congestion is caused by inexactly feedback. At this moment congestion are solved by the involvement of two controlling mechanisms. These mechanisms are flow/congestion control in the TCP source and Active Queue Management (AQM) in the router. AQM will provide feedback to the source a kind of indication for the occurrence of the congestion …


The Role Of 1 And 9 Wt.% Zn In Precipitation Hardening Of Aa319 Aluminium, Bondan Tiara Sofyan, Sari Susanti, Ridwan R. Yusfranto Apr 2008

The Role Of 1 And 9 Wt.% Zn In Precipitation Hardening Of Aa319 Aluminium, Bondan Tiara Sofyan, Sari Susanti, Ridwan R. Yusfranto

Makara Journal of Technology

The Role of 1 and 9 wt.% Zn in Precipitation Hardening of AA319 Aluminium. Aluminium alloys are widely used for automotive application due to its low density and high corrosion resistance. For economic reason, casting of automotive products always uses aluminium scrap as charging materials that may result in fluctuation of content of alloying element, such as Zn. This research studies the role of Zn in precipitation hardening of AA319 aluminium alloys. Hardness and tensile testing were conducted to study the mechanical properties of the alloys, while ageing response was followed by hardness measurements. Evolution of microstructures was observed by …


A Study Of Co2 Absorption Using Jet Bubble Column, Setiadi Setiadi, Nita Tania Hadiyani, Hantizen Hantizen, Dijan Supramono Apr 2008

A Study Of Co2 Absorption Using Jet Bubble Column, Setiadi Setiadi, Nita Tania Hadiyani, Hantizen Hantizen, Dijan Supramono

Makara Journal of Technology

A Study of CO2 Absorption Using Jet Bubble Column. The phenomenon of plunging jet gas-liquid contact occurs quite often in nature, it's momentum carries small air bubbles with it into the reactor medium. The momentum of the liquid stream can be sufficient to carry small bubbles completely to the bottom of the vessel. A stream of liquid falling toward a level surface of that liquid will pull the surrounding air along with it. It will indent the surface of the liquid to form a trumpet-like shape. If the velocity of the stream is high enough, air bubbles will be pulled …


Building Fire Safety Audit At Faculty X, University Of Indonesia, Year 2006, Fatma Lestari, Rm. Yodan Amaral Panindrus Apr 2008

Building Fire Safety Audit At Faculty X, University Of Indonesia, Year 2006, Fatma Lestari, Rm. Yodan Amaral Panindrus

Makara Journal of Technology

Building Fire Safety Audit at Faculty X, University of Indonesia, Year 2006. Fire may cause loss of life, material and valuable assets. The objective of this study is to conduct audit for fire safety and emergency response in the building at Faculty X, University of Indonesia, Depok. The audit results on the building fire safety facilities including emergency response and preparedness are then compared to the Building Code Australia (BCA) and Indonesian regulation on the building fire safety (Kep.MenPU.No 10 and 11/KPTS/2000). The building selected are Building A, B, C, D, F and G. Building classification for A, B, D, …


Substrates Preparation From Woody Tropical Waste Biomass For Biohydrogen Production, Dwi Susilaningsih, Theresia Umi Harwati, Khairul Anam, Yopi Yopi Apr 2008

Substrates Preparation From Woody Tropical Waste Biomass For Biohydrogen Production, Dwi Susilaningsih, Theresia Umi Harwati, Khairul Anam, Yopi Yopi

Makara Journal of Technology

Substrates Preparation from Woody Tropical Waste Biomass for Biohydrogen Production. Addressing to the global warming problem, energy crisis and pollution, hydrogen production by micro-organisms using biotechnological approach should be considered, since it fulfils the recent society requirement to safely produce, renewable and environmental friendly energy. Hydrogen is one of the most promising green energy sources, because it is easily converted to electricity and cleanly combustible. There are three types of micro-organisms for hydrogen production, the first is cyanobacteria through the photosynthesis process, the second is anaerobic bacteria, which use organic substances as electron donor and energy and convert them to …


Biomass Production Chlorella Vulgaris Buitenzorg Using Series Of Bubble Column Photo Bioreactor With A Periodic Illumination, Anondho Wijanarko, Dianursanti Dianursanti, Muryanto Muryanto, Josia Simanjuntak, Praswasti Pembangun Dyah Kencana Wulan, Heri Hermansyah, Misri Gozan, Roekmijati Widaningroem Soemantojo Apr 2008

Biomass Production Chlorella Vulgaris Buitenzorg Using Series Of Bubble Column Photo Bioreactor With A Periodic Illumination, Anondho Wijanarko, Dianursanti Dianursanti, Muryanto Muryanto, Josia Simanjuntak, Praswasti Pembangun Dyah Kencana Wulan, Heri Hermansyah, Misri Gozan, Roekmijati Widaningroem Soemantojo

Makara Journal of Technology

Chlorella vulgaris Buitenzorg cultivation using three bubble column photo bioreactors arranged in series with a volume of 200 mL for 130 hours shows an increase of biomass production of Chlorella vulgaris Buitenzorg up to 1.20 times and a decrease of the ability of CO2 fixation compared to single reactor at a periodic sun illumination cycle. The operation conditions on cultivation are as following: T, 29.0oC; P,1 atm.; UG, 2.40 m/h; CO2, 10%; Benneck medium; and illumination source by Phillip Halogen Lamp 20W /12V/ 50Hz. Other research parameters such as microbial carbon dioxide transferred rate (qco2), CO2 transferred rate (CTR), energy …


The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland Jan 2008

The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland

Journal of Digital Forensics, Security and Law

All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …


Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt Jan 2008

Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt

Journal of Digital Forensics, Security and Law

Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.


Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler Jan 2008

Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the fifth Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn S. Dardick (gdardick@dardick.net).


Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull Jan 2008

Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull

Journal of Digital Forensics, Security and Law

Desktop search applications can contain cached copies of files that were deleted from the file system. Forensic investigators see this as a potential source of evidence, as documents deleted by suspects may still exist in the cache. Whilst there have been attempts at recovering data collected by desktop search applications, there is no methodology governing the process, nor discussion on the most appropriate means to do so. This article seeks to address this issue by developing a process model that can be applied when developing an information extraction application for desktop search applications, discussing preferred methods and the limitations of …


The Forensics Aspects Of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin W. Manes Jan 2008

The Forensics Aspects Of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin W. Manes

Journal of Digital Forensics, Security and Law

The proper generation and preservation of digital data from Event Data Recorders (EDRs) can provide invaluable evidence to automobile crash reconstruction investigations. However, data collected from the EDR can be difficult to use and authenticate, complicating the presentation of such information as evidence in legal proceedings. Indeed, current techniques for removing and preserving such data do not meet the court’s standards for electronic evidence. Experimentation with an EDR unit from a 2001 GMC Sierra pickup truck highlighted particular issues with repeatability of results. Fortunately, advances in the digital forensics field and memory technology can be applied to EDR analysis in …


Data Mining Techniques In Fraud Detection, Rekha Bhowmik Jan 2008

Data Mining Techniques In Fraud Detection, Rekha Bhowmik

Journal of Digital Forensics, Security and Law

The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision treebased algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.


To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea Jan 2008

To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea

Journal of Digital Forensics, Security and Law

In this paper the authors examine statutes that regulate, license, and enforce investigative functions in each US state. After identification and review of Private Investigator licensing requirements, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. After contacting all state agencies the authors present a distinct grouping organizing state approaches to professional Digital Examiner licensing. The authors conclude that states must differentiate between Private Investigator and Digital Examiner licensing requirements and oversight.


An Evaluation Of Windows-Based Computer Forensics Application Software Running On A Macintosh, Gregory H. Carlton Jan 2008

An Evaluation Of Windows-Based Computer Forensics Application Software Running On A Macintosh, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems are marketed with the ability to accommodate these three common operating system environments, including Windows XP in native and virtual environments. We performed a series of experiments to measure the functionality and performance of the two …


Book Review: Guide To Computer Forensics And Investigations (3rd Ed.), Keyu Jiang, Ruifeng Xuan Jan 2008

Book Review: Guide To Computer Forensics And Investigations (3rd Ed.), Keyu Jiang, Ruifeng Xuan

Journal of Digital Forensics, Security and Law

No abstract provided.


Remote Forensics May Bring The Next Sea Change In E-Discovery: Are All Networked Computers Now Readily Accessible Under The Revised Federal Rules Of Civil Procedure?, Joseph J. Schwerha, Scott Inch Jan 2008

Remote Forensics May Bring The Next Sea Change In E-Discovery: Are All Networked Computers Now Readily Accessible Under The Revised Federal Rules Of Civil Procedure?, Joseph J. Schwerha, Scott Inch

Journal of Digital Forensics, Security and Law

The recent amendments to Rule 26 of the Federal Rules of Civil Procedure created a two-tiered approach to discovery of electronically stored information (“ESI”). Responding parties must produce ESI that is relevant, not subject to privilege, and reasonably accessible. However, because some methods of storing ESI, such as on magnetic backup tapes and within enormous databases, require substantial cost to access and search their contents, the rules permit parties to designate those repositories as “not reasonably accessible” because of undue burden or cost. But even despite the difficulty in searching for ESI, the party’s duty to preserve potentially responsive evidence …


Trends In Virtualized User Environments, Diane Barrett Jan 2008

Trends In Virtualized User Environments, Diane Barrett

Journal of Digital Forensics, Security and Law

Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will explain how …


Extraction And Categorisation Of User Activity From Windows Restore Points, Damir Kahvedžić, Tahar Kechadi Jan 2008

Extraction And Categorisation Of User Activity From Windows Restore Points, Damir Kahvedžić, Tahar Kechadi

Journal of Digital Forensics, Security and Law

The extraction of the user activity is one of the main goals in the analysis of digital evidence. In this paper we present a methodology for extracting this activity by comparing multiple Restore Points found in the Windows XP operating system. The registry copies represent a snapshot of the state of the system at a certain point in time. Differences between them can reveal user activity from one instant to another. The algorithms for comparing the hives and interpreting the results are of high complexity. We develop an approach that takes into account the nature of the investigation and the …


Data Recovery From Palmmsgv001, Satheesaan Pasupatheeswaran Jan 2008

Data Recovery From Palmmsgv001, Satheesaan Pasupatheeswaran

Journal of Digital Forensics, Security and Law

Both SMS and MMS data analysis is an important factor in mobile forensic analysis. Author did not find any mobile forensic tool that is capable of extracting short messages (SMS) and multimedia messages (MMS) from Palm Treo 750. SMS file of Palm Treo 750 is called PalmMgeV001 and it is a proprietary file system. A research work done to find a method to recover SMS data from PalmMsgV001 file. This paper is going to describe the research work and its findings. This paper also discusses a methodology that will help recover SMS data from PalmMsgV001. The PalmMsgV001 file is analysed …