Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 45

Full-Text Articles in Engineering

The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland Jan 2008

The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland

Journal of Digital Forensics, Security and Law

All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …


Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler Jan 2008

Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the fifth Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn S. Dardick (gdardick@dardick.net).


Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler Jan 2008

Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler

Journal of Digital Forensics, Security and Law

No abstract provided.


The Characteristic Basis Function Method (Cbfm): A Numerically Efficient Strategy For Solving Large Electromagnetic Scattering Problems, Eugenio Lucente, Gianluigi Tiberi, Agostino Monorchio, Giuliano Manara, Raj Mittra Jan 2008

The Characteristic Basis Function Method (Cbfm): A Numerically Efficient Strategy For Solving Large Electromagnetic Scattering Problems, Eugenio Lucente, Gianluigi Tiberi, Agostino Monorchio, Giuliano Manara, Raj Mittra

Turkish Journal of Electrical Engineering and Computer Sciences

The objective of this paper is to describe a numerically efficient strategy for solving large electromagnetic scattering problems. This novel approach, termed as the Characteristic Basis Function Method (CBFM), is based on utilizing Characteristic Basic Functions (CBFs)-special functions defined on macro domains (blocks)-that include a relatively large number of conventional sub-domains discretized by using triangular or rectangular patches. The CBFs can be derived either analytically (from PO solutions), or by applying the conventional MoM. Use of these basis functions leads to a significant reduction in the number of unknowns, and results in a substantial size reduction of the MoM matrix. …


Online Tuning Of Set-Point Regulator With A Blending Mechanism Using Pi Controller, Engi̇n Yeşi̇l, Müjde Güzelkaya, İbrahi̇m Eksi̇n, Ö. Aydin Teki̇n Jan 2008

Online Tuning Of Set-Point Regulator With A Blending Mechanism Using Pi Controller, Engi̇n Yeşi̇l, Müjde Güzelkaya, İbrahi̇m Eksi̇n, Ö. Aydin Teki̇n

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a new control structure that exploits the advantages of one degree of freedom (1-DOF) and two degree of freedom (2-DOF) control structures with an online tuned set-point regulator with blending mechanism (SPR-BM) is proposed. In this structure, the filtered output of the reference and the pure reference signals are blended so that the overall performance of the system is ameliorated with respect to load disturbance rejection and set-point following. Internal Model Control (IMC) based PI controller is used as the primary controller and the blending dynamics are determined with the aim of producing a system output that …


A New Approach Using Temporal Radial Basis Function In Chronological Series, Mustapha Guezouri Jan 2008

A New Approach Using Temporal Radial Basis Function In Chronological Series, Mustapha Guezouri

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, we present an extended form of Radial Basis Function network called Temporal-RBF (T-RBF) network. This extended network can be used in decision rules and classification in Spatio-Temporal domain applications, like speech recognition, economic fluctuations, seismic measurements and robotics applications. We found that such a network complies with relative ease to constraints such as capacity of universal approximation, sensibility of node, local generalisation in receptive field, etc. For an optimal solution based on a probabilistic approach with a minimum of complexity, we propose two TRBF models (1 and 2). Application to the problem of Mackey-Glass time series has …


A Summary Of Recent Developments On Metamaterial-Based And Metamaterial-Inspired Efficient Electrically Small Antennas, Aycan Erentok, Richard W. Ziolkowski Jan 2008

A Summary Of Recent Developments On Metamaterial-Based And Metamaterial-Inspired Efficient Electrically Small Antennas, Aycan Erentok, Richard W. Ziolkowski

Turkish Journal of Electrical Engineering and Computer Sciences

This paper summarizes our recent research efforts to realize efficient electrically small antenna (EESA) systems based on ideal analytical and numerical metamaterial-based antenna systems, and physically realized metamaterial-inspired antenna designs. Our theoretical and numerical studies of the radiation and resonance behaviors of the proposed metamaterial-based EESA systems, as well as our efforts to conceptualize structures which might be used to build them, have led to the discovery of several realizable metamaterial-inspired EESA systems. The measurement results confirm the numerical performance predictions.


My Collaboration With Raj Mittra: Contributions To The Theory Of Perfectly Matched Layers, Mustafa Kuzuoğlu Jan 2008

My Collaboration With Raj Mittra: Contributions To The Theory Of Perfectly Matched Layers, Mustafa Kuzuoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

No abstract provided.


Comparison Of Rectangular And Cylindrical Fdtd Representations On A Ring Resonator Problem, Funda Akleman, Levent Sevgi̇ Jan 2008

Comparison Of Rectangular And Cylindrical Fdtd Representations On A Ring Resonator Problem, Funda Akleman, Levent Sevgi̇

Turkish Journal of Electrical Engineering and Computer Sciences

The aim of this paper is to discuss rectangular and cylindrical representations of finite-difference time-domain (FDTD) method over characteristic tests and comparisons. A ring resonator is chosen as a canonical structure and modeled with both rectangular- and cylindrical-FDTD packages. Calibration against analytical exact solution derived in terms of cylindrical Bessel functions is also performed. It is shown that rectangular-FDTD with periodic boundary condition, where the computation domain is reduced, can also be applied in modeling circular structures.


Method Of Moments Solution By Using Sinc-Type Basis Functions For The Scattering From A Finite Number Of Conducting Strip Gratings, Taner Oğuzer, Fadil Kuyucuoğlu Jan 2008

Method Of Moments Solution By Using Sinc-Type Basis Functions For The Scattering From A Finite Number Of Conducting Strip Gratings, Taner Oğuzer, Fadil Kuyucuoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

A numerical method of moments (MoM) solution is applied to the electromagnetic scattering from a periodic finite conducting strip array when the incident electromagnetic plane wave E and H polarizations illuminate the grating. For such grating strip geometry, we deal with singular integral equations arising from Neumann and Dirichlet boundary conditions. MoM is applied using band-limited sinc functions as basis and testing functions. The Galerkin approach is followed in MoM formulation. The properties of the sinc function, with the infinite integral, are exploited in the computations of the main matrix elements. Also, the error in our approach goes to zero …


Generation Of High-Repetition-Rate Pulses Utilizing Cascaded Single Mode Fiber And Semiconductor Optical Amplifier, Jianwei Wu, Hai-Bo Bao Jan 2008

Generation Of High-Repetition-Rate Pulses Utilizing Cascaded Single Mode Fiber And Semiconductor Optical Amplifier, Jianwei Wu, Hai-Bo Bao

Turkish Journal of Electrical Engineering and Computer Sciences

To generate high-repetition-rate optical pulses, a novel and simple device is demonstrated, in which the cascaded single mode fiber (SMF) with negative third order dispersion and semiconductor optical amplifier (SOA) are adopted. Numerical research results show that let an optical pulse with center wavelength in zero dispersion wavelength of optical fiber transit in SMF for generating an oscillation pulse. Subsequently, the followed SOA is provided for amplification. As a consequence, the high-repetition-rate optical pulses can be obtained.


Evolutionary Algorithms For The Unit Commitment Problem, A. Şi̇ma Uyar, Belgi̇n Türkay Jan 2008

Evolutionary Algorithms For The Unit Commitment Problem, A. Şi̇ma Uyar, Belgi̇n Türkay

Turkish Journal of Electrical Engineering and Computer Sciences

This paper compares three evolutionary computation techniques, namely Steady-State Genetic Algorithms, Evolutionary Strategies and Differential Evolution for the Unit Commitment Problem. The comparison is based on a set of experiments conducted on benchmark datasets as well as on real-world data obtained from the Turkish Interconnected Power System. The results of two state-of-the-art evolutionary approaches, namely a Generational Genetic Algorithm and a Memetic Algorithm for the same benchmark datasets are also included in the paper for comparison. The tests show that Differential Evolution is the best performer among all approaches on the test data used in the paper. The performances of …


A Study On The Reliability Of Polyester Insulators Blended With Borax, Aysel Ersoy, Yasi̇n Özcelep, Ayten Kuntman Jan 2008

A Study On The Reliability Of Polyester Insulators Blended With Borax, Aysel Ersoy, Yasi̇n Özcelep, Ayten Kuntman

Turkish Journal of Electrical Engineering and Computer Sciences

Tracking is the main factor which limits the safe working electric stress of insulation in power system applications. Polymer samples have been tested in laboratory conditions according to ASTM D2303 on accelerated inclined plane tracking test. In this paper, a model based on improved Weibull statistics is proposed for estimating the breakdown time of polymeric insulating materials with borax. The confidence intervals of the Weibull shape parameter and the Weibull scale parameter are determined for the borax concentration values using the Weibull 7++ program.


Recent Advances In Perfectly Matched Layers In Finite Element Applications, Özlem Özgün, Mustafa Kuzuoğlu Jan 2008

Recent Advances In Perfectly Matched Layers In Finite Element Applications, Özlem Özgün, Mustafa Kuzuoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

We present a comparative evaluation of two novel and practical perfectly matched layer (PML) implementations to the problem of mesh truncation in the finite element method (FEM): locally-conformal PML, and multi-center PML techniques. The most distinguished feature of these methods is the simplicity and flexibility to design conformal PMLs over challenging geometries, especially those with curvature discontinuities, in a straightforward way without using artificial absorbers. These methods are based on specially- and locally-defined complex coordinate transformations inside the PML region. They can easily be implemented in a conventional FEM by just replacing the nodal coordinates inside the PML region by …


Who Is Reading The Data On Your Old Computer?, Vivienne Mee Jan 2008

Who Is Reading The Data On Your Old Computer?, Vivienne Mee

Journal of Digital Forensics, Security and Law

Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers. How would you dispose of your old computer, or how would the company you work for dispose of their old computers?

The majority of Irish homeowners, would bring their old computers to local civic amenity centres, give it away to a relative or sell it on to another party.

Some organisations would give their old equipment to a staff member, as a gift gesture, others may simply discard in the local civic amenity site.

What is wrong with the methods currently being …


Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull Jan 2008

Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull

Journal of Digital Forensics, Security and Law

Desktop search applications can contain cached copies of files that were deleted from the file system. Forensic investigators see this as a potential source of evidence, as documents deleted by suspects may still exist in the cache. Whilst there have been attempts at recovering data collected by desktop search applications, there is no methodology governing the process, nor discussion on the most appropriate means to do so. This article seeks to address this issue by developing a process model that can be applied when developing an information extraction application for desktop search applications, discussing preferred methods and the limitations of …


Table Of Contents Jan 2008

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Trends In Virtualized User Environments, Diane Barrett Jan 2008

Trends In Virtualized User Environments, Diane Barrett

Journal of Digital Forensics, Security and Law

Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will explain how …


Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt Jan 2008

Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt

Journal of Digital Forensics, Security and Law

Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.


Data Mining Techniques In Fraud Detection, Rekha Bhowmik Jan 2008

Data Mining Techniques In Fraud Detection, Rekha Bhowmik

Journal of Digital Forensics, Security and Law

The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision treebased algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.


Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland Jan 2008

Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland

Journal of Digital Forensics, Security and Law

The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …


Table Of Contents Jan 2008

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Remote Forensics May Bring The Next Sea Change In E-Discovery: Are All Networked Computers Now Readily Accessible Under The Revised Federal Rules Of Civil Procedure?, Joseph J. Schwerha, Scott Inch Jan 2008

Remote Forensics May Bring The Next Sea Change In E-Discovery: Are All Networked Computers Now Readily Accessible Under The Revised Federal Rules Of Civil Procedure?, Joseph J. Schwerha, Scott Inch

Journal of Digital Forensics, Security and Law

The recent amendments to Rule 26 of the Federal Rules of Civil Procedure created a two-tiered approach to discovery of electronically stored information (“ESI”). Responding parties must produce ESI that is relevant, not subject to privilege, and reasonably accessible. However, because some methods of storing ESI, such as on magnetic backup tapes and within enormous databases, require substantial cost to access and search their contents, the rules permit parties to designate those repositories as “not reasonably accessible” because of undue burden or cost. But even despite the difficulty in searching for ESI, the party’s duty to preserve potentially responsive evidence …


The Forensics Aspects Of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin W. Manes Jan 2008

The Forensics Aspects Of Event Data Recorders, Jeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin W. Manes

Journal of Digital Forensics, Security and Law

The proper generation and preservation of digital data from Event Data Recorders (EDRs) can provide invaluable evidence to automobile crash reconstruction investigations. However, data collected from the EDR can be difficult to use and authenticate, complicating the presentation of such information as evidence in legal proceedings. Indeed, current techniques for removing and preserving such data do not meet the court’s standards for electronic evidence. Experimentation with an EDR unit from a 2001 GMC Sierra pickup truck highlighted particular issues with repeatability of results. Fortunately, advances in the digital forensics field and memory technology can be applied to EDR analysis in …


An Evaluation Of Windows-Based Computer Forensics Application Software Running On A Macintosh, Gregory H. Carlton Jan 2008

An Evaluation Of Windows-Based Computer Forensics Application Software Running On A Macintosh, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems are marketed with the ability to accommodate these three common operating system environments, including Windows XP in native and virtual environments. We performed a series of experiments to measure the functionality and performance of the two …


To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea Jan 2008

To License Or Not To License: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea

Journal of Digital Forensics, Security and Law

In this paper the authors examine statutes that regulate, license, and enforce investigative functions in each US state. After identification and review of Private Investigator licensing requirements, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. After contacting all state agencies the authors present a distinct grouping organizing state approaches to professional Digital Examiner licensing. The authors conclude that states must differentiate between Private Investigator and Digital Examiner licensing requirements and oversight.


Book Review: Guide To Computer Forensics And Investigations (3rd Ed.), Keyu Jiang, Ruifeng Xuan Jan 2008

Book Review: Guide To Computer Forensics And Investigations (3rd Ed.), Keyu Jiang, Ruifeng Xuan

Journal of Digital Forensics, Security and Law

No abstract provided.


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


Extraction And Categorisation Of User Activity From Windows Restore Points, Damir Kahvedžić, Tahar Kechadi Jan 2008

Extraction And Categorisation Of User Activity From Windows Restore Points, Damir Kahvedžić, Tahar Kechadi

Journal of Digital Forensics, Security and Law

The extraction of the user activity is one of the main goals in the analysis of digital evidence. In this paper we present a methodology for extracting this activity by comparing multiple Restore Points found in the Windows XP operating system. The registry copies represent a snapshot of the state of the system at a certain point in time. Differences between them can reveal user activity from one instant to another. The algorithms for comparing the hives and interpreting the results are of high complexity. We develop an approach that takes into account the nature of the investigation and the …


Data Recovery From Palmmsgv001, Satheesaan Pasupatheeswaran Jan 2008

Data Recovery From Palmmsgv001, Satheesaan Pasupatheeswaran

Journal of Digital Forensics, Security and Law

Both SMS and MMS data analysis is an important factor in mobile forensic analysis. Author did not find any mobile forensic tool that is capable of extracting short messages (SMS) and multimedia messages (MMS) from Palm Treo 750. SMS file of Palm Treo 750 is called PalmMgeV001 and it is a proprietary file system. A research work done to find a method to recover SMS data from PalmMsgV001 file. This paper is going to describe the research work and its findings. This paper also discusses a methodology that will help recover SMS data from PalmMsgV001. The PalmMsgV001 file is analysed …