Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Digital forensics (4)
- Active filters (3)
- Analog signal processing (2)
- Case study (2)
- Digital evidence (2)
-
- Face recognition (2)
- Forensics (2)
- Fuzzy control (2)
- Genetic algorithm (2)
- Induction motor (2)
- Linear matrix inequality (2)
- Parameter estimation (2)
- Particle swarm optimization (2)
- Sensorless speed control (2)
- Stewart platform (2)
- UAV (2)
- 2DPCA (1)
- : Google Desktop (1)
- ADSL router forensics (1)
- ADSS cable (1)
- AIS (1)
- ANN (1)
- Accounting information systems (1)
- Active filter (1)
- Active polyphase filters (1)
- Active power filter (1)
- Adaptive filter design (1)
- Ageing process (1)
- Aging (1)
- Air terminal (1)
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (74)
- Journal of Digital Forensics, Security and Law (40)
- Journal of Marine Science and Technology (4)
- Applications and Applied Mathematics: An International Journal (AAM) (2)
- School of Computer Science & Engineering Faculty Publications (2)
Articles 1 - 30 of 130
Full-Text Articles in Physical Sciences and Mathematics
Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn
Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn
The African Journal of Information Systems
This article reports on the recent implementation and current deployment of accounting information systems in Libyan commercial banks. A case study approach is adopted that moves from an initial screening of the 14 main Libyan banks to a final in-depth study of just three banks. Business process modeling and systems profiling are used to assess the status of the banks in terms of systems use, process change and information systems strategy development. Libyan banks are well advanced in their installation of modern packaged software but could be used to greater effect to optimize business processes and improve efficiencies. Training and …
2011 Meeting Missing Abstracts
2011 Meeting Missing Abstracts
Virginia Journal of Science
Abstracts not included in Virginia Journal of Science Volume 62, No. 1 and 2, presented at the 89th Annual Meeting of the Virginia Academy of Science, May 25-27, 2011, at the University of Richmond, Richmond VA.
Privacy In "The Cloud": Applying Nissenbaum's Theory Of Contextual Integrity, Frances Grodzinsky, Herman T. Tavani
Privacy In "The Cloud": Applying Nissenbaum's Theory Of Contextual Integrity, Frances Grodzinsky, Herman T. Tavani
School of Computer Science & Engineering Faculty Publications
The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy (Nissenabum 2010), to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging technologies. We then apply that heuristic device to questions surrounding one aspect of cloud computing -- viz., …
Privacy-Preserving Transactions On The Web, Sahil Behl, Leszek T. Lilien
Privacy-Preserving Transactions On The Web, Sahil Behl, Leszek T. Lilien
The Hilltop Review
There is a rapid growth in the number of applications using sensitive and personal information on the World Wide Web. This growth creates an urgent need to maintain the anonymity of the participants in many web transactions and to preserve the privacy of their sensitive data during data dissemination over the web. First, maintaining the anonymity of users on the World Wide Web is essential for a number of web applications. Anonymity cannot be assured by single interested individuals or an organization but requires participation from other web nodes owned by other entities. Second, preserving the privacy of sensitive data …
Iterative Learning From Texts And Counterexamples Using Additional Information, Sanjay Jain, Efim Kinber
Iterative Learning From Texts And Counterexamples Using Additional Information, Sanjay Jain, Efim Kinber
School of Computer Science & Engineering Faculty Publications
A variant of iterative learning in the limit (cf. Lange and Zeugmann 1996) is studied when a learner gets negative examples refuting conjectures containing data in excess of the target language and uses additional information of the following four types: (a) memorizing up to n input elements seen so far; (b) up to n feedback memberships queries (testing if an item is a member of the input seen so far); (c) the number of input elements seen so far; (d) the maximal element of the input seen so far. We explore how additional information available to such learners (defined and …
An Information Technology (It) Based Approach For Enhancing Prompt And Effective Post-Disaster Reconstruction, Faisal Manzoor Arain
An Information Technology (It) Based Approach For Enhancing Prompt And Effective Post-Disaster Reconstruction, Faisal Manzoor Arain
Business Review
Information technology (IT) has become strongly established as a supporting tool for many professional tasks in recent years. One application of IT, namely the knowledge management system, has attracted significant attention requiring further exploration as it has the potential to enhance processes, based on the expertise of the decision-makers. A knowledge management system can undertake intelligent tasks in a specific domain that is normally performed by highly skilled people. Typically, the success of such a system relies on the ability to represent the knowledge for a particular subject. Post-disaster reconstruction and rehabilitation is a complex issue with several dimensions. Government, …
A Cellular Automata Model Of Infection Control On Medical Implants, Alicia Prieto-Langarica, Hristo Kojouharov, Benito Chen-Charpentier, Liping Tang
A Cellular Automata Model Of Infection Control On Medical Implants, Alicia Prieto-Langarica, Hristo Kojouharov, Benito Chen-Charpentier, Liping Tang
Applications and Applied Mathematics: An International Journal (AAM)
S. epidermidis infections on medically implanted devices are a common problem in modern medicine due to the abundance of the bacteria. Once inside the body, S. epidermidis gather in communities called biofilms and can become extremely hard to eradicate, causing the patient serious complications. We simulate the complex S. epidermidis-Neutrophils interactions in order to determine the optimum conditions for the immune system to be able to contain the infection and avoid implant rejection. Our cellular automata model can also be used as a tool for determining the optimal amount of antibiotics for combating biofilm formation on medical implants.
Shooting Neural Networks Algorithm For Solving Boundary Value Problems In Odes, Kais I. Ibraheem, Bashir M. Khalaf
Shooting Neural Networks Algorithm For Solving Boundary Value Problems In Odes, Kais I. Ibraheem, Bashir M. Khalaf
Applications and Applied Mathematics: An International Journal (AAM)
The objective of this paper is to use Neural Networks for solving boundary value problems (BVPs) in Ordinary Differential Equations (ODEs). The Neural networks use the principle of Back propagation. Five examples are considered to show effectiveness of using the shooting techniques and neural network for solving the BVPs in ODEs. The convergence properties of the technique, which depend on the convergence of the integration technique and accuracy of the interpolation technique are considered.
Embedding Parallel Computation In A Stochastic Mesh Network: A Morphogenetic Approach, Max Orhai
Embedding Parallel Computation In A Stochastic Mesh Network: A Morphogenetic Approach, Max Orhai
Anthós
Many basic techniques in computer science have been founded on the assumption that physical computing resources are scarce but orderly, and that the cost of effective direct communication between physically distant parts of a computer system is affordable. In ubiquitous computing systems such as sensor networks, or in the design of nano-scale systems, these familiar assumptions may not hold.
What if we suppose instead that computing capacity is plentiful, but that only local communication is possible, and the exact structure of the communication network is not known in advance? This is the domain of spatial programming.
How can we program …
Section Abstracts: Computer Science
Section Abstracts: Computer Science
Virginia Journal of Science
Abstracts of the Computer Sciences Section for the 89th Annual Meeting of the Virginia Academy of Science, May 25-27, 2011, University of Richmond, Richmond VA.
Generalized Xyz Data Editor Software For Marine Geophysical Survey, Yet-Chung Chang, Ching-Hui Tsai, Shu-Kun Hsu
Generalized Xyz Data Editor Software For Marine Geophysical Survey, Yet-Chung Chang, Ching-Hui Tsai, Shu-Kun Hsu
Journal of Marine Science and Technology
For most marine surveying data processing tasks, such as gravity, magnetic or echo-sounding, to find and eliminate the errors among the raw data is a tedious and time-consuming process. Usually, the Graphical User Interface (GUI) software provided with the data acquisition system is very useful to reduce the manpower requirements and speed up processing. However, each tool typically only displays one specific data type or format. In this paper, a GUI program is designed for general marine geophysical data editing. It allows users to define their own data formats, and thereafter it can recognize the data type automatically according to …
Due-Date Assignment And Optional Maintenance Activity Scheduling Problem With Linear Deterioreting Jobs, Chou-Jung Hsu, Suh-Jenq Yang, Dar-Li Yang
Due-Date Assignment And Optional Maintenance Activity Scheduling Problem With Linear Deterioreting Jobs, Chou-Jung Hsu, Suh-Jenq Yang, Dar-Li Yang
Journal of Marine Science and Technology
The focus of this work is to analyze linear deteriorating jobs in a single-machine scheduling problem with due-date assignment and maintenance activity. The linear deteriorating jobs means its processing time is an increasing function of their starting time. The objective is to minimize the total of earliness, tardiness and due-date cost. To solve the scheduling problem addressed in this work, we have to determine the job sequence, the common due-date, and the location of a maintenance activity. We show that the problem can be solved optimally in O(n2 log n) time.
Computation Programs Of The Astronomical Vessel Position, Chih-Li Chen, Tsung-Hsuan Hsieh
Computation Programs Of The Astronomical Vessel Position, Chih-Li Chen, Tsung-Hsuan Hsieh
Journal of Marine Science and Technology
In open sea sailing, as opposed to sailing with satellite navigation systems, the astronomical vessel position (AVP) is not limited by military codes. If programs can be developed to solve the AVP directly, drawbacks of current methods for performing marine operations can be greatly improved. Complete AVP computations have two necessary points: compute the observed altitude and compute the AVP for two bodies. Thus, this paper utilizes Matlab® programming language to develop the observed altitude (ObsAltPro) and the AVP by using intercept method (IMPro-2) programs, respectively. Adopting the ObsAltPro can avoid the use of nautical almanacs and directly obtain the …
Numerical Solutions Of Differential-Algebraic Equations And Its Applications In Solving Tppc Problems, He-Sheng Wang, Wei-Lun Jhu, Chee-Fai Yung, Ping-Feng Wang
Numerical Solutions Of Differential-Algebraic Equations And Its Applications In Solving Tppc Problems, He-Sheng Wang, Wei-Lun Jhu, Chee-Fai Yung, Ping-Feng Wang
Journal of Marine Science and Technology
In this paper, we present a numerical method for solving nonlinear differential algebraic equations (DAE’s) based on the backward differential formulas (BDF) and the Pade series. Usefulness of the method is then illustrated by a numerical example, which is concerned with the derivation of the optimal guidance law for spacecraft. This kind of problems is called trajectory-prescribed path control (TPPC) in the literature. We reformulate the problem as a Hamiltonian DAE system (usually with a higher index). After establishing the system of spacecraft dynamics, we can derive the optimal guidance law of the system by the proposed numerical method.
Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore
Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore
Journal of Digital Forensics, Security and Law
The popularity of Voice over the Internet Protocol (VoIP) is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to criminals, as many implementations use strong encryption to secure both the voice payload as well as to control messages making monitoring such VoIP calls difficult since conventional methods such as wire-tapping is …
Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte
Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte
Journal of Digital Forensics, Security and Law
As Digital Forensics practitioners, we know that our discipline is constantly evolving. Keeping abreast means we need to continually refine and broaden our knowledge pools through experience, education, research, peer exchange, and more. Mobile device forensics can be especially dynamic and challenging. With multiple standards in place at the hardware, operating system, and user interface levels, it can be daunting to preserve, analyze, search and report on these tiny yet ubiquitous hand-held computers. Apple Computer’s line of mobile products (iOS devices - iPhone, iPad, iPod Touch) is no exception to this rule.
Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma
Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma
Journal of Digital Forensics, Security and Law
With the huge volumes of electronic data subject to discovery in virtually every instance of litigation, time and costs of conducting discovery have become exceedingly important when litigants plan their discovery strategies. Rather than incurring the costs of having lawyers review every document produced in response to a discovery request in search of relevant evidence, a cost effective strategy for document review planning is to use statistical sampling of the database of documents to determine the likelihood of finding relevant evidence by reviewing additional documents. This paper reviews and discusses how sampling can be used to make document review more …
Column: Every Last Byte, Simson Garfinkel
Column: Every Last Byte, Simson Garfinkel
Journal of Digital Forensics, Security and Law
Inheritance powder is the name that was given to poisons, especially arsenic, that were commonly used in the 17th and early 18th centuries to hasten the death of the elderly. For most of the 17th century, arsenic was deadly but undetectable, making it nearly impossible to prove that someone had been poisoned. The first arsenic test produced a gas—hardly something that a scientist could show to a judge. Faced with a growing epidemic of poisonings, doctors and chemists spent decades searching for something better