Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Conference

2012

Institution
Keyword
Publication

Articles 1 - 30 of 37

Full-Text Articles in Physical Sciences and Mathematics

Material Balance Adjustement In Raw Material Processing, Migena Hoxha, Piro Zoga, Aida Bode Nov 2012

Material Balance Adjustement In Raw Material Processing, Migena Hoxha, Piro Zoga, Aida Bode

UBT International Conference

Circuit of one processing plant was studied in order to adjust the mass balance. The granulometric composition of the streams that belong to grinding and classifying processes was analysed, while the chemical content was determined only at the streams related to separation process. Three connection matrixes are considered in this paper, one corresponding to the size fraction equations, the second corresponding to the chemical content measurements and the third, the solid flow rate balance. The technique used consisted of filtering all the data by a weighted least-squares procedure. Then running the output data in a custom designed feature of the …


Mechatronics And Mechatronics Management, Peter Kopacek Nov 2012

Mechatronics And Mechatronics Management, Peter Kopacek

UBT International Conference

Mechatronics bringing together a number of technologies mechanical engineering, control engineering, electrical engineering, electronic engineering,computer technology. Mechatronics as an umbrella integrates areas of technology like measurement systems and sensors, actuation systems and drives, systems behavior, control, and microprocessor systems. Education in Mechatronics is highly interdisplinary. Graduates with a BSc or MSc degree in Mechatronics get usually higher or medium management positions in Industry requiring some knowledge in management. Therefore an education program ―Mechatronics Management‖ was developed by an international consortium and implemented at UBT in Prishtina


Dynamic Modeling And Analysis Of Propulsion Effect Of 3 Dof Robot, Ahmet Shala, Xhevahir Bajrami Nov 2012

Dynamic Modeling And Analysis Of Propulsion Effect Of 3 Dof Robot, Ahmet Shala, Xhevahir Bajrami

UBT International Conference

Dynamical Modeling of robots is commonly first important step of Modeling, Analysis and Control of robotic systems. This paper is focused on using Denavit-Hartenberg (DH) convention for kinematics and Newton-Euler Formulations for dynamic modeling of 3 DoF - Degree of Freedom of 3D robot. The process of deriving of dynamical model is done using Software Maple. Simulations are done using Matlab/Simulink for analysis of propulsion effect under Earth gravity when First Link rotates with 1000 rpm, second Link can move free in vertical direction and Third Link can rotates free around their rotations axle. Simulations results shows very good propulsion …


The Effectiveness Of The Use Of Solar Panels In Hotels Of Durres Area, Asllan Hajderi, Shkelqim Gjevori Nov 2012

The Effectiveness Of The Use Of Solar Panels In Hotels Of Durres Area, Asllan Hajderi, Shkelqim Gjevori

UBT International Conference

In the present study is analyzing the case of the application of solar energy with vacuum tube collectors for heating water for sanitary needs in hotels of Durres areas. In recent years there has been a special interest by the leading authorities to the EU countries and the U.S., for the use of renewable energies in general and solar energy in particular. This is mainly related with the reduction of environmental pollution from gas CO2, which directly influences the greenhouse effect and global warming. Unlike other forms of renewable energy, like wind turbines, photovoltaic panels and biomass usages, the use …


Water Resources Systems Planning And Management, Piro Zoga, Aida Bode, Ramiz Balla, Nevton Kodhelaj, Spartak Kucaj Nov 2012

Water Resources Systems Planning And Management, Piro Zoga, Aida Bode, Ramiz Balla, Nevton Kodhelaj, Spartak Kucaj

UBT International Conference

The most fundamental human needs of water are for drinking, cooking and personal hygiene. In order to fulfill these needs, the quality of the water used should cause no risk to human health. The quality of the water in nature also affects the condition of ecosystems all living organisms depend on. At the same time, humans use water bodies as convenient sinks for the disposal of domestic, industrial and agricultural wastewaters. This, of course, degrades the quality of those water bodies. Water resources management involves the monitoring and management of water quality as much as the monitoring and management of …


Computer Aided Analysis Of Kinematics And Kinetostatics Of Six-Bar Linkage Mechanism Through The Contour Method, Qelaj Mehmet, Likaj Ramë Nov 2012

Computer Aided Analysis Of Kinematics And Kinetostatics Of Six-Bar Linkage Mechanism Through The Contour Method, Qelaj Mehmet, Likaj Ramë

UBT International Conference

In this paper is presented a six-bar linkage mechanism of the pump for oil extrusion. In this mechanism are introduced even higher kinematic pairs. Dimensions and other incoming links will be adopted as necessary. For the six-bar linkage mechanism will be carried out the kinematic analysis and for all linkages will be presented the displacement, velocity and acceleration. The analysis will be performed by MathCad software, while kinetostatic analysis will be carried out using Contour Method, comparing results of two different software‘s MathCAD and Working Model. The simulation parameters will be computed for all points of the contours of mechanism.


Nanotechnology And His Effects In Medicine, Hatixhe Bilibashi Nov 2012

Nanotechnology And His Effects In Medicine, Hatixhe Bilibashi

UBT International Conference

Nanotechnology is a great revolution in the field of information technology that has effects on almost every aspect of the human society nowadays. It is one of the technologies with huge potentials in many directions. Nanotechnology can be defined as the manipulation, precision-placement, modeling and manufacture of material at the nanometer scale (One meter consists of 1 billion nanometers) ( 10〗^(-9) of a meter). ).Therefore nanotechnology can help save the lives of many people. Main fields in medicine where nanotechnology can be found are the control and prevention of cancer, diagnostication of the drug dependance, diagnostication of the diabet es, …


Advancement Of The Plastering Machine, Bujar Ademi, Peter Kopacek Nov 2012

Advancement Of The Plastering Machine, Bujar Ademi, Peter Kopacek

UBT International Conference

Automation of water flow at plastering machines is a solution which serves the process of plastering, to adhere international standards.Automation of water flow by taking signals from the condition of the material depending on humidity. So its output is used to influence the increase or decrease of the amount of water flow in the valve.Water flow automation is a system which consists of several components in which the already, develop different processes. To realese the feedback we need a sensor which is built by piezoelemnt in which we have the phenomenon of the frequency. With which we have to create …


Urban Waste Water Discharges And Their Treatment: Case Study Waste Water Treatment Plant Of Kavaja (Wwtpk), Aida Bode, Nevton Kodhelaj, Piro Zoga, Doriana Xhulaj Nov 2012

Urban Waste Water Discharges And Their Treatment: Case Study Waste Water Treatment Plant Of Kavaja (Wwtpk), Aida Bode, Nevton Kodhelaj, Piro Zoga, Doriana Xhulaj

UBT International Conference

WWTPK is the first plant built sewage purification in the Republic of Albania (RA). This plant it is placed in the Kavaja region, district of Tirana. For this is an important area sewage treatment and waste water treatment according to the standards of the Ministry of Environment, Forestry and Water Management (MoE) in Republic of Albania and not directly discharged untreated in nature. In order to determine productivity of the IPUZ and to predict the future of the operation, the results of the analysis of BOD, COD, SS are produced. According to chemical analyzes carried out in the period from …


The Surface Distribution Of Oil Spills, The Environmental Status Of The Visoka Oilfield, Its Rehabilitation Ways: Case Study, Nevton Kodhelaj, Aida Bode, Piro Zoga, Nevina Koja, Esmeralda Zeqo, Dulian Zeqiraj Nov 2012

The Surface Distribution Of Oil Spills, The Environmental Status Of The Visoka Oilfield, Its Rehabilitation Ways: Case Study, Nevton Kodhelaj, Aida Bode, Piro Zoga, Nevina Koja, Esmeralda Zeqo, Dulian Zeqiraj

UBT International Conference

Visoka oilfield was explored in 1963 through the well G-622. In this oilfield had been drilled more than 170 production wells. Through all this years of its exploitation, mainly because of the outdated technology, the environmental pollution reached really dramatic values. The pollution extends on the Visoka village, affecting so the life for the entire community. The oil spills, the gas emissions and the formation water affected and polluted and ―k illed‖ the Gjanica River, its delta and the Adriatic coast in the Semani beach. Due to the technology and the completely wrong policies, used in the past, the wells …


Research Of Agronomic And Quality Traits Of Winter Barley Varieties (Hordeum Vulgare L.) Under Growing Conditions In The Republic Of Kosovo, Nexhdet Shala, Bakir Kelmendi Nov 2012

Research Of Agronomic And Quality Traits Of Winter Barley Varieties (Hordeum Vulgare L.) Under Growing Conditions In The Republic Of Kosovo, Nexhdet Shala, Bakir Kelmendi

UBT International Conference

The object of this paper is the research of agronomic and quality trains of winter varieties (hordeum vulgare L.) their adaptability and specific reactions towards growing conditions in the Republic of Kosovo. During three year trails on localities in Dukagjini area and area of Kosovo we researched 5 winter barley varieties. Environment has been explored together with estimation of significant parameters of grain yield, hectoliter weight, protein and starch content. Impact of year, location and variety on grain yield, hectoliter grain weight, protein and starch content has been estimated by analysis of variance. Environmental effects of planting barley cultivars in …


Bailey/Howe Reference Analytics: What Two Years Of Data Tell Us, Elizabeth Berman Aug 2012

Bailey/Howe Reference Analytics: What Two Years Of Data Tell Us, Elizabeth Berman

UVM Libraries Conference Day

Analyzing the last two academic years (2010-2011 and 2011-2012) of reference-desk statistics, this presentation will highlight trends at the Bailey/Howe Reference Desk, and offer scenarios for the future of reference services.


Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky May 2012

Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky

Annual ADFSL Conference on Digital Forensics, Security and Law

An examination of State of Connecticut v. Julie Amero provides insight into how a general lack of understanding of digital evidence can cause an innocent defendant to be wrongfully convicted. By contrast, the 101-page opinion in Lorraine v. Markel American Insurance Co. provides legal precedence and a detailed consideration for the admission of digital evidence. An analysis of both cases leads the authors to recommend additions to Law School curricula designed to raise the awareness of the legal community to ensure such travesties of justice, as in the Amero case, don’t occur in the future. Work underway at the University …


After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma May 2012

After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

In 2003 the Zubulake case became the catalyst of change in the world of e-discovery. In that case Judge Shira Scheindlin of the United States District Court for the Southern District of New York set guidelines for e-discovery that served as the basis for amending the Federal Rules of Civil Procedure (FRCP) in December 2006. The amendments incorporated a number of concepts that were described by Judge Scheindlin in the Zubulake case. ( Zubulake v. UBS Warburg LLC, 2003) Since the Zubulake case and the FRCP amendments, numerous cases have interpreted these rules changes, but one of the main points …


A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington May 2012

A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington

Annual ADFSL Conference on Digital Forensics, Security and Law

Perfunctory case analysis, lack of evidence validation, and an inability or unwillingness to present understandable analysis reports adversely affect the outcome course of legal trials reliant on digital evidence. These issues have serious consequences for defendants facing heavy penalties or imprisonment yet expect their defence counsel to have clear understanding of the evidence. Poorly reasoned, validated and presented digital evidence can result in conviction of the innocent as well as acquittal of the guilty. A possession of child pornography Case Study highlights the issues that appear to plague case analysis and presentation of digital evidence relied on in these odious …


Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick May 2012

Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick

Annual ADFSL Conference on Digital Forensics, Security and Law

This work explores the impact of the emerging mobile communication device paradigm on the security-conscious enterprise, with regard to providing insights for proactive Information Assurance and facilitation of eventual Forensic analysis. Attention is given to technology evolution in the areas of best practices, attack vectors, software and hardware performance, access and activity monitoring, and architectural models.

Keywords: Forensics, enterprise security, mobile communication, best practices, attack vectors.


Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow May 2012

Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

A multi-parameter sensitivity analysis of a Bayesian network (BN) used in the digital forensic investigation of the Yahoo! email case has been performed using the principle of ‘steepest gradient’ in the parameter space of the conditional probabilities. This procedure delivers a more reliable result for the dependence of the posterior probability of the BN on the values used to populate the conditional probability tables (CPTs) of the BN. As such, this work extends our previous studies using singleparameter sensitivity analyses of BNs, with the overall aim of more deeply understanding the indicative use of BNs within the digital forensic and …


Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili May 2012

Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an …


Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow May 2012

Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian …


A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier May 2012

A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves pseudo randomly and therefore similar files cannot be identified. However, in the area of computer forensics it is also necessary to find similar files (e.g. different versions of a file), wherefore we need a similarity preserving hash function also called fuzzy hash function. In this paper we present a new approach for …


The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey May 2012

The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today's gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, …


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser May 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Annual ADFSL Conference on Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …


Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape May 2012

Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape

Annual ADFSL Conference on Digital Forensics, Security and Law

The detection of hidden messages in JPEG images is a growing concern. Current detection of JPEG stego images must include detection of double compression: a JPEG image is double compressed if it has been compressed with one quality factor, uncompressed, and then re-compressed with a different quality factor. When detection of double compression is not included, erroneous detection rates are very high. The main contribution of this paper is to present an efficient double-compression detection algorithm that has relatively lower dimensionality of features and relatively lower computational time for the detection part, than current comparative classifiers. We use a model-based …


A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad May 2012

A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper investigates an unexplored concept in Cyber Forensics, namely, a Programming Blunder. Programming Blunder is identified as a variable or a code segment or a field in a database table, which is hardly used or executed in the context of the application or the user’s functionality. Blunder genes can be found in many parts of any program. It is the contention of this paper that this phenomenon of blunders needs to be studied systematically from its very genetic origins to their surface realizations in contrast to bugs and flaws, especially in view of their importance in software copyright infringement …


Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen May 2012

Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper updates previous work on the level of consensus in foundational elements of digital evidence examination. Significant consensus is found present only after definitions are made explicit, suggesting that, while there is a scientific agreement around some of the basic notions identified, the use of a common language is lacking.

Keywords: Digital forensics examination, terminology, scientific methodology, testability, validation, classification, scientific consensus


Underpinning Statistical Computing Knowledge And Skills For Students, Wing Kin, Ken Li May 2012

Underpinning Statistical Computing Knowledge And Skills For Students, Wing Kin, Ken Li

Practical Social and Industrial Research Symposium

No abstract provided.


Traffic Counter Mobile Application, Victor Molano Apr 2012

Traffic Counter Mobile Application, Victor Molano

College of Engineering: Graduate Celebration Programs

INTRODUCTION

Manual Counters:

•The vehicles counts and characteristics at signalized intersections and others transportation facilities are usually made using manual counters. These manual counters are mechanical or digital boards in which the user can record the different observations from the field. The use of these devices is usually required when more sophisticated methods are not available, when expensive equipment is not justified and for scholastic practices.


Node Filtering And Face Routing For Sensor Network, Umang Amatya Apr 2012

Node Filtering And Face Routing For Sensor Network, Umang Amatya

College of Engineering: Graduate Celebration Programs

Main Contributions

•Efficient Algorithms for identifying Redundant Sensor Nodes

•New Technique for Filtering Redundant Nodes in Sensor Network

•Reliable Algorithm for Message Routing - Forwarding

•User Friendly Prototype Implementation in Java

•Results of Experimental Investigation


Architecture For An Interactive Motion-Based Traffic Simulation Environment, Romesh Khaddar, Naveen Veeramisti, Alexander Paz, Pushkin Kachroo Apr 2012

Architecture For An Interactive Motion-Based Traffic Simulation Environment, Romesh Khaddar, Naveen Veeramisti, Alexander Paz, Pushkin Kachroo

College of Engineering: Graduate Celebration Programs

In simple words, the objective of this research is to identify the effect of human behavior on traffic To enhance the traffic simulation modeling realism by involving actual human beings navigating the system along with simulated entities in an immersive environment


Real-Time Face Detection And Recognition, Parker Hill, Brendan Morris Apr 2012

Real-Time Face Detection And Recognition, Parker Hill, Brendan Morris

College of Engineering: Graduate Celebration Programs

The face has become a popular biometric for identification due to the wide range of features and difficulty in manipulation of the metric. In order to work towards a robust facial recognition system, this work contains a foundation for using the face as a recognition metric. First, faces are detected from still images using a Viola-Jones object detection algorithm. Then, Eigenfaces is applied to the detected faces. The system was tested on face databases as well as real-time feed from a web camera.