Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

2010

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 54

Full-Text Articles in Electrical and Computer Engineering

Model-Based Analysis Of Electric Drive Options For Medium-Duty Parcel Delivery Vehicles, Robb A. Barnitt, Aaron D. Brooker, Laurie Ramroth Dec 2010

Model-Based Analysis Of Electric Drive Options For Medium-Duty Parcel Delivery Vehicles, Robb A. Barnitt, Aaron D. Brooker, Laurie Ramroth

Publications (T)

Medium-duty vehicles are used in a broad array of fleet applications, including parcel delivery. These vehicles are excellent candidates for electric drive applications due to their transient-intensive duty cycles, operation in densely populated areas, and relatively high fuel consumption and emissions. The National Renewable Energy Laboratory (NREL) conducted a robust assessment of parcel delivery routes and completed a model-based techno-economic analysis of hybrid electric vehicle (HEV) and plug-in hybrid electric vehicle (PHEV) configurations. First, NREL characterized parcel delivery vehicle usage patterns, most notably daily distance driven and drive-cycle intensity. Second, drive-cycle analysis results framed the selection of drive cycles used …


College Of Engineering Senior Design Competition Fall 2010, University Of Nevada, Las Vegas Dec 2010

College Of Engineering Senior Design Competition Fall 2010, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge.

The senior design competition helps to focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects …


Evaluation Of Video Based Pedestrian And Vehicle Detection Algorithms, Varun Bandarupalli Dec 2010

Evaluation Of Video Based Pedestrian And Vehicle Detection Algorithms, Varun Bandarupalli

UNLV Theses, Dissertations, Professional Papers, and Capstones

Video based detection systems rely on the ability to detect moving objects in video streams. Video based detection systems have applications in many fields like, intelligent transportation, automated surveillance etc. There are many approaches adopted for video based detection. Evaluation and selecting a suitable approach for pedestrian and vehicle detection is a challenging task. While evaluating the object detection algorithms, many factors should be considered in order to cope with unconstrained environments, non stationary background, different object motion patterns and the variation in types of object being detected.

In this thesis, we implement and evaluate different video based detection algorithms …


Closing The Gap Between The Industry And Higher Education Institutions- Case Examples From East African Region, Deogratias Harorimana Mr Nov 2010

Closing The Gap Between The Industry And Higher Education Institutions- Case Examples From East African Region, Deogratias Harorimana Mr

Dr Deogratias Harorimana

Much complained about is the quality of graduates Universities put on the labour market. Less talked about however is why knowledge institutions seems to be bad knowledge managers. In this presentation I argue that DIRECT collaborative relationship between Industry,Governments and Higher Education Institutions is a per-requisite.Good relationship is key to building such a successful knowledge transfer strategies between Industries and Educational and Research Institutions. This paper explores what makes a good Knowledge Transfer Partnership Strategy and highlights some key lessons for businesses, Universities and Government bodies. This paper was a Key note presentation to the Annual International Conference on Building …


Green Power Marketing In The United States: A Status Report (2009 Data), Lori Bird, Jenny Sumner Sep 2010

Green Power Marketing In The United States: A Status Report (2009 Data), Lori Bird, Jenny Sumner

Publications (E)

This report documents green power marketing activities and trends in the United States. Aggregate green power sales data for all voluntary purchase markets across the United States are presented for 2009. The data presented in this report are based primarily on figures provided to NREL by utilities and independent renewable energy marketers. Because data cannot be obtained from all market participants, the estimates presented here likely represent an underestimate of the market size. Key trends identified in this year’s report include:
• In 2009, total retail sales of renewable energy in voluntary markets exceeded 30 million MWh, an increase of …


Iphone 3gs Forensics: Logical Analysis Using Apple Itunes Backup Utility, Mona Bader, Ibrahim Baggili Sep 2010

Iphone 3gs Forensics: Logical Analysis Using Apple Itunes Backup Utility, Mona Bader, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The iPhone mobile is used worldwide due to its enhanced computing capabilities, increased storage capacity as well as its attractive touch interface. These characteristics made the iPhone a popular smart phone device. The increased use of the iPhone lead it to become a potential source of digital evidence in criminal investigations. Therefore, iPhone forensics turned into an essential practice for forensic and security practitioners today. This research aimed at investigating and examining the logical backup acquisition of the iPhone 3GS mobile device using the Apple iTunes backup utility. It was found that significant data of forensic value such as e-mail …


Research On Distribution Program Of Food Cold-Chain Logistics In Bright Speed Fresh Logistics Company, Zexin Xu Jul 2010

Research On Distribution Program Of Food Cold-Chain Logistics In Bright Speed Fresh Logistics Company, Zexin Xu

World Maritime University Dissertations

No abstract provided.


Case Study Of Cold Chain Logistics Business Of Third Party Logistics Company, Han Bao Jul 2010

Case Study Of Cold Chain Logistics Business Of Third Party Logistics Company, Han Bao

World Maritime University Dissertations

No abstract provided.


Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns May 2010

Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …


The Defiance College Undergraduate Major In Digital Forensic Science: Setting The Bar Higher, Gregg H. Gunsch May 2010

The Defiance College Undergraduate Major In Digital Forensic Science: Setting The Bar Higher, Gregg H. Gunsch

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper provides background information to accompany the panel discussion on Curriculum Design and Implementation in Computer Forensics Education. It is specifically focused on the content and delivery of Defiance College’s undergraduate (B.S.) program majoring in Digital Forensic Science (DFS). The genesis and evolution of the Defiance College DFS program are described, along with its successes, challenges and known opportunities for improvement. The desired outcomes of the panel discussion include articulating the necessary components of an undergraduate program, refining expectations of knowledge and skills required of students upon graduation, and suggesting strategies for achieving those expectations despite inevitable resource limitations …


Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky May 2010

Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …


Canvass - A Steganalysis Forensic Tool For Jpeg Images, Jennifer L. Davidson, Jaikishan Jalan May 2010

Canvass - A Steganalysis Forensic Tool For Jpeg Images, Jennifer L. Davidson, Jaikishan Jalan

Annual ADFSL Conference on Digital Forensics, Security and Law

Steganography is a way to communicate a message such that no one except the sender and recipient suspects the existence of the message. This type of covert communication lends itself to a variety of different purposes such as spy-to-spy communication, exchange of pornographic material hidden in innocuous image files, and other illicit acts. Computer forensic personnel have an interest in testing for possible steganographic files, but often do not have access to the technical and financial resources required to perform steganalysis in an effective manner. This paper describes the results of a funded effort by a grant from the National …


A Layered Framework Approach To Mitigate Crimeware, Mathew Nyamagwa May 2010

A Layered Framework Approach To Mitigate Crimeware, Mathew Nyamagwa

Annual ADFSL Conference on Digital Forensics, Security and Law

Crimeware attacks are growing at such an alarming rate and are becoming so prevalent that the FBI now rank cybercrime among its top priorities after terrorism and espionage. New studies estimate cyber crimes cost firms an astounding $1 trillion annually. But the good news? Over 80% of them are preventable. Crimeware is not a purely technical threat but more or a socio-technical affair. This clearly brings out the fact that computers do not commit a crime, but we (humans) do! In this paper I propose a layered approach that involves all stakeholders from end-users to service-providers and law enforcement to …


Measuring Whitespace Patterns As An Indication Of Plagiarism, Ilana Shay, Nikolaus Baer, Robert Zeidman May 2010

Measuring Whitespace Patterns As An Indication Of Plagiarism, Ilana Shay, Nikolaus Baer, Robert Zeidman

Annual ADFSL Conference on Digital Forensics, Security and Law

There are several different methods of comparing source code from different programs to find copying1 . Perhaps the most common method is comparing source code statements, comments, strings, identifiers, and instruction sequences. However, there are anecdotes about the use of whitespace patterns in code. These virtually invisible patterns of spaces and tabs have been used in litigation to imply copying, but no formal study has been performed that shows that these patterns can actually identify copied code. This paper presents a detailed study of whitespace patterns and the uniqueness of these patterns in different programs.

Keywords: Copyright Infringement, Intellectual Property, …


Electronic Discovery: A Fool’S Errand Where Angels Fear To Tread?, Milton Luoma, Vicki Luoma May 2010

Electronic Discovery: A Fool’S Errand Where Angels Fear To Tread?, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

Electronic discovery has transformed the discovery phase of civil litigation in recent years. The expectations of lawyers and parties were initially established in the Rowe and Zubulake cases that led to a complete revision of the electronic discovery rules contained in the Federal Rules of Civil Procedure. Subsequent cases have underscored the importance of document search methodologies and implications for attorneys, IT professionals, and digital forensics professionals. The authors review how electronic discovery has evolved thus far and offer recommendations regarding the electronic discovery process.

Keywords: Electronic discovery, e-discovery, keyword search, concept search,


Hard Disk Storage: Firmware Manipulation And Forensic Impact And Current Best Practice, Gareth Davies, Iain Sutherland May 2010

Hard Disk Storage: Firmware Manipulation And Forensic Impact And Current Best Practice, Gareth Davies, Iain Sutherland

Annual ADFSL Conference on Digital Forensics, Security and Law

The most common form of storage media utilized in both commercial and domestic systems is the hard disk drive, consequently these devices feature heavily in digital investigations. Hard disk drives are a collection of complex components. These components include hardware and firmware elements that are essential for the effective operation of the drive. There are now a number of devices available, intended for data recovery, which can be used to manipulate the firmware components contained within the drive. It has been previously shown that it is possible to alter firmware for malicious purposes, either to conceal information or to prevent …


Social Networking: A Boon To Criminals, Tejashree D. Datar, Richard Mislan May 2010

Social Networking: A Boon To Criminals, Tejashree D. Datar, Richard Mislan

Annual ADFSL Conference on Digital Forensics, Security and Law

With the world getting more and more digitized, social networking has also found a place in the cyber world. These social networking sites (SNSs) which enable people to socialize, and build and maintain relationships are attracting attention of all kinds of people such as teens, adults, sports persons, and even businesses. But these SNSs are also getting unwanted attention from people like sexual predators, spammers, and people involved in criminal and illegal activities. This paper talks about SNSs and how these sites are exploited for criminal or illegal activity. The SNSs are discussed in detail with respect to user profiles, …


Organizational Handling Of Digital Evidence, Sheona A. Hoolachan, William B. Glisson May 2010

Organizational Handling Of Digital Evidence, Sheona A. Hoolachan, William B. Glisson

Annual ADFSL Conference on Digital Forensics, Security and Law

There are a number of factors that impact a digital forensics investigation. These factors include: the digital media in question, implemented processes and methodologies, the legal aspects, and the individuals involved in the investigation. This paper presents the initial idea that Digital Forensic Practice (DFP) recommendations can potentially improve how organizations handle digital evidence. The recommendations are derived from an in-depth survey conducted with practitioners in both commercial organizations and law enforcement along with supporting literature. The recommendations presented in this paper can be used to assess an organization’s existing digital forensics practices and a guide to Digital Forensics Improvement …


A Framework To Integrate The Data Of Interview Investigation And Digital Evidence, Fahad Alshathry May 2010

A Framework To Integrate The Data Of Interview Investigation And Digital Evidence, Fahad Alshathry

Annual ADFSL Conference on Digital Forensics, Security and Law

The physical interview process in crime investigation produces an extremely large amount of data, particularly in big cases. In comparison, examiners of digital evidence have enormous amounts of data to search through whilst looking for data relating to the investigation. However, the links between their results are limited. Whilst investigators need to refute or support their hypothesis throughout, digital evidence examiners often use search based keywords. These keywords are usually created from evidence taken from the physical investigation reports and this basic method has been found to have many shortcomings and limitations. This paper proposes a highly automatic framework to …


Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli May 2010

Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …


Higate (High Grade Anti‐Tamper Equipment) Prototype And Application To E‐Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki May 2010

Higate (High Grade Anti‐Tamper Equipment) Prototype And Application To E‐Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki

Annual ADFSL Conference on Digital Forensics, Security and Law

These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …


Fast Energy Loss Computation And Fuzzy-Based Shunt Capacitor Insertion, Philadelphia University May 2010

Fast Energy Loss Computation And Fuzzy-Based Shunt Capacitor Insertion, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Developing A Baccalaureate Digital Forensics Major, John H. Riley May 2010

Developing A Baccalaureate Digital Forensics Major, John H. Riley

Annual ADFSL Conference on Digital Forensics, Security and Law

As colleges and universities consider instituting a bachelor’s degree in digital forensics or computer forensics, there are numerous questions to be addressed. While some of these normally occur in the development of any new major, there are aspects of digital forensics which do not often (if ever) occur in other majors. We discuss the issues that should be resolved in the development of a baccalaureate degree program in digital forensics.

Keywords: Digital forensics major. Computer forensics major.


College Of Engineering Senior Design Competition Spring 2010, University Of Nevada, Las Vegas Apr 2010

College Of Engineering Senior Design Competition Spring 2010, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Each student in his or her senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. The senior design project encourages the student to use everything learned in the engineering program to create a practical, real-world solution to an engineering challenge.

A highlight of the year-long senior design project is the senior design competition. This competition, which usually takes place the week before finals each semester, helps focus the senior students on increasing the quality and potential for commercial application for their design projects.

Judges from local industry evaluate the projects on innovation, commercial …


Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana Mar 2010

Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana

Dr Deogratias Harorimana

It can be said that development practice requires more than financial and manpower inputs. Rwanda, in 1994 suffered a Genocide. The Society,collectively and under the leadership of His Excellence Paul Kagame the current elected President of Rwanda came together and designed strategies that would propel Rwanda to a Middle-Income, Private Sector Led Economy by the Year 2020.

In 2009, a client seating in one of the Hotels in a Suburb of Remera, in Kigali City, complained about poor service delivery he was experiencing from the waitress staff.Using his Blackberry message, the client forwarded an email to some of the RDB …


Conference Proceedings 3rd International Scientific Conference On “Energy Systems With It” At Alvsjö Fair In Association With Energitinget March 16-17 2010, Dr. Erik Dahlquist, Dr. Jenny Palm Mar 2010

Conference Proceedings 3rd International Scientific Conference On “Energy Systems With It” At Alvsjö Fair In Association With Energitinget March 16-17 2010, Dr. Erik Dahlquist, Dr. Jenny Palm

Dr. Erik Dahlquist

2010 “The Energiting” is performed for the 12th time. The International Scientific conference is arranged for the 3rd time. The organisers are Swedish Energy Agency, Mälardalen University and the Research School for Energy Systems with LiU, KTH, UU and CTH. The first topic will be “Energy systems” covering use of renewable energy sources, energy conversion and process efficiency improvement with new technologies, as well as societal aspects of the introduction of new technologies. The second topic is “Energy and IT”. This covers energy and load management, interaction between production, distribution and “consumption”, usage of data for decision support and control, …


Measuring Variations Of Mimicry By Means Of Prosodic Cues In Task-Based Scenarios And Conversational Speech, Brian Vaughan, Celine De Looze Mar 2010

Measuring Variations Of Mimicry By Means Of Prosodic Cues In Task-Based Scenarios And Conversational Speech, Brian Vaughan, Celine De Looze

Other resources

Here, we address the measurement of mimicry, that is when speakers’ speech variations look like parallel patterns.

As a definition of mimicry, we often read in the literature description such as mimicry is “The situation where the observed behaviours of two inter-actants although dissimilar at the start of the interaction are moving towards behavioral matching”. These types of descriptions imply that mimicry is a linear phenomenon and that speakers tend to imitate over time. However, it can be assumed, especially when studying spontaneous speech, that there are rather phases of mimicry and non-mimicry and that mimicry should be rather …


Design Of A Monocular Multi-Spectral Skin Detection, Melanin Estimation, And False-Alarm Suppression System, Keith R. Peskosky Mar 2010

Design Of A Monocular Multi-Spectral Skin Detection, Melanin Estimation, And False-Alarm Suppression System, Keith R. Peskosky

Theses and Dissertations

A real-time skin detection, false-alarm reduction, and melanin estimation system is designed targeting search and rescue (SAR) with application to special operations for manhunting and human measurement and signatures intelligence. A mathematical model of the system is developed and used to determine how the physical system performs under illumination, target-to-sensor distance, and target-type scenarios. This aspect is important to the SAR community to gain an understanding of the deployability in different operating environments. A multi-spectral approach is developed and consists of two short-wave infrared cameras and two visible cameras. Through an optical chain of lenses, custom designed and fabricated dichroic …


The Carillon And Its Haptic Signature : Modeling The Changing Force-Feedback Constraints Of A Musical Instrument For Haptic Display, Mark Havryliv, F. Geiger, M. Gurtler, Fazel Naghdy, Greg Schiemer Feb 2010

The Carillon And Its Haptic Signature : Modeling The Changing Force-Feedback Constraints Of A Musical Instrument For Haptic Display, Mark Havryliv, F. Geiger, M. Gurtler, Fazel Naghdy, Greg Schiemer

Greg Schiemer

The carillon is one of the few instruments that elicits sophisticated haptic interaction from amateur and professional players alike. Like the piano keyboard, the velocity of a player’s impact on each carillon key, or baton, affects the quality of the resultant tone; unlike the piano, each carillon baton returns a different force-feedback. Force-feedback varies widely from one baton to the next across the entire range of the instrument and with further idiosyncratic variation from one instrument to another. This makes the carillon an ideal candidate for haptic simulation. The application of synthesized forcefeedback based on an analysis of forces operating …


Enterprise Development Policies And Capacity-Building In Science, Technology And Innovation (Sti)-Response To The Issue Note, Deogratias Harorimana Jan 2010

Enterprise Development Policies And Capacity-Building In Science, Technology And Innovation (Sti)-Response To The Issue Note, Deogratias Harorimana

Dr Deogratias Harorimana

Enterprise Development, Investment and Business Climate are all important for economic growth. But what policies, strategies are needed to make economic growth a reality. The author has followed one of the World's fastest reformer and emerging nation in the Heart of Africa-Rwanda. The paper shares lessons and practical aspects related to building an entrepreneurial population, and building a government which is a facilitator of business climate