Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Journal

2011

Institution
Keyword
Publication

Articles 1 - 30 of 130

Full-Text Articles in Physical Sciences and Mathematics

Front Matter Dec 2011

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2011

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2011

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn Nov 2011

Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn

The African Journal of Information Systems

This article reports on the recent implementation and current deployment of accounting information systems in Libyan commercial banks. A case study approach is adopted that moves from an initial screening of the 14 main Libyan banks to a final in-depth study of just three banks. Business process modeling and systems profiling are used to assess the status of the banks in terms of systems use, process change and information systems strategy development. Libyan banks are well advanced in their installation of modern packaged software but could be used to greater effect to optimize business processes and improve efficiencies. Training and …


2011 Meeting Missing Abstracts Oct 2011

2011 Meeting Missing Abstracts

Virginia Journal of Science

Abstracts not included in Virginia Journal of Science Volume 62, No. 1 and 2, presented at the 89th Annual Meeting of the Virginia Academy of Science, May 25-27, 2011, at the University of Richmond, Richmond VA.


Privacy In "The Cloud": Applying Nissenbaum's Theory Of Contextual Integrity, Frances Grodzinsky, Herman T. Tavani Oct 2011

Privacy In "The Cloud": Applying Nissenbaum's Theory Of Contextual Integrity, Frances Grodzinsky, Herman T. Tavani

School of Computer Science & Engineering Faculty Publications

The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy (Nissenabum 2010), to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging technologies. We then apply that heuristic device to questions surrounding one aspect of cloud computing -- viz., …


Masthead Sep 2011

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Sep 2011

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Sep 2011

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Privacy-Preserving Transactions On The Web, Sahil Behl, Leszek T. Lilien Sep 2011

Privacy-Preserving Transactions On The Web, Sahil Behl, Leszek T. Lilien

The Hilltop Review

There is a rapid growth in the number of applications using sensitive and personal information on the World Wide Web. This growth creates an urgent need to maintain the anonymity of the participants in many web transactions and to preserve the privacy of their sensitive data during data dissemination over the web. First, maintaining the anonymity of users on the World Wide Web is essential for a number of web applications. Anonymity cannot be assured by single interested individuals or an organization but requires participation from other web nodes owned by other entities. Second, preserving the privacy of sensitive data …


Iterative Learning From Texts And Counterexamples Using Additional Information, Sanjay Jain, Efim Kinber Sep 2011

Iterative Learning From Texts And Counterexamples Using Additional Information, Sanjay Jain, Efim Kinber

School of Computer Science & Engineering Faculty Publications

A variant of iterative learning in the limit (cf. Lange and Zeugmann 1996) is studied when a learner gets negative examples refuting conjectures containing data in excess of the target language and uses additional information of the following four types: (a) memorizing up to n input elements seen so far; (b) up to n feedback memberships queries (testing if an item is a member of the input seen so far); (c) the number of input elements seen so far; (d) the maximal element of the input seen so far. We explore how additional information available to such learners (defined and …


An Information Technology (It) Based Approach For Enhancing Prompt And Effective Post-Disaster Reconstruction, Faisal Manzoor Arain Jul 2011

An Information Technology (It) Based Approach For Enhancing Prompt And Effective Post-Disaster Reconstruction, Faisal Manzoor Arain

Business Review

Information technology (IT) has become strongly established as a supporting tool for many professional tasks in recent years. One application of IT, namely the knowledge management system, has attracted significant attention requiring further exploration as it has the potential to enhance processes, based on the expertise of the decision-makers. A knowledge management system can undertake intelligent tasks in a specific domain that is normally performed by highly skilled people. Typically, the success of such a system relies on the ability to represent the knowledge for a particular subject. Post-disaster reconstruction and rehabilitation is a complex issue with several dimensions. Government, …


Front Matter Jun 2011

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Jun 2011

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Jun 2011

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


A Cellular Automata Model Of Infection Control On Medical Implants, Alicia Prieto-Langarica, Hristo Kojouharov, Benito Chen-Charpentier, Liping Tang Jun 2011

A Cellular Automata Model Of Infection Control On Medical Implants, Alicia Prieto-Langarica, Hristo Kojouharov, Benito Chen-Charpentier, Liping Tang

Applications and Applied Mathematics: An International Journal (AAM)

S. epidermidis infections on medically implanted devices are a common problem in modern medicine due to the abundance of the bacteria. Once inside the body, S. epidermidis gather in communities called biofilms and can become extremely hard to eradicate, causing the patient serious complications. We simulate the complex S. epidermidis-Neutrophils interactions in order to determine the optimum conditions for the immune system to be able to contain the infection and avoid implant rejection. Our cellular automata model can also be used as a tool for determining the optimal amount of antibiotics for combating biofilm formation on medical implants.


Shooting Neural Networks Algorithm For Solving Boundary Value Problems In Odes, Kais I. Ibraheem, Bashir M. Khalaf Jun 2011

Shooting Neural Networks Algorithm For Solving Boundary Value Problems In Odes, Kais I. Ibraheem, Bashir M. Khalaf

Applications and Applied Mathematics: An International Journal (AAM)

The objective of this paper is to use Neural Networks for solving boundary value problems (BVPs) in Ordinary Differential Equations (ODEs). The Neural networks use the principle of Back propagation. Five examples are considered to show effectiveness of using the shooting techniques and neural network for solving the BVPs in ODEs. The convergence properties of the technique, which depend on the convergence of the integration technique and accuracy of the interpolation technique are considered.


Embedding Parallel Computation In A Stochastic Mesh Network: A Morphogenetic Approach, Max Orhai Jun 2011

Embedding Parallel Computation In A Stochastic Mesh Network: A Morphogenetic Approach, Max Orhai

Anthós

Many basic techniques in computer science have been founded on the assumption that physical computing resources are scarce but orderly, and that the cost of effective direct communication between physically distant parts of a computer system is affordable. In ubiquitous computing systems such as sensor networks, or in the design of nano-scale systems, these familiar assumptions may not hold.

What if we suppose instead that computing capacity is plentiful, but that only local communication is possible, and the exact structure of the communication network is not known in advance? This is the domain of spatial programming.

How can we program …


Section Abstracts: Computer Science Apr 2011

Section Abstracts: Computer Science

Virginia Journal of Science

Abstracts of the Computer Sciences Section for the 89th Annual Meeting of the Virginia Academy of Science, May 25-27, 2011, University of Richmond, Richmond VA.


Front Matter Mar 2011

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Mar 2011

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Mar 2011

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Generalized Xyz Data Editor Software For Marine Geophysical Survey, Yet-Chung Chang, Ching-Hui Tsai, Shu-Kun Hsu Feb 2011

Generalized Xyz Data Editor Software For Marine Geophysical Survey, Yet-Chung Chang, Ching-Hui Tsai, Shu-Kun Hsu

Journal of Marine Science and Technology

For most marine surveying data processing tasks, such as gravity, magnetic or echo-sounding, to find and eliminate the errors among the raw data is a tedious and time-consuming process. Usually, the Graphical User Interface (GUI) software provided with the data acquisition system is very useful to reduce the manpower requirements and speed up processing. However, each tool typically only displays one specific data type or format. In this paper, a GUI program is designed for general marine geophysical data editing. It allows users to define their own data formats, and thereafter it can recognize the data type automatically according to …


Due-Date Assignment And Optional Maintenance Activity Scheduling Problem With Linear Deterioreting Jobs, Chou-Jung Hsu, Suh-Jenq Yang, Dar-Li Yang Feb 2011

Due-Date Assignment And Optional Maintenance Activity Scheduling Problem With Linear Deterioreting Jobs, Chou-Jung Hsu, Suh-Jenq Yang, Dar-Li Yang

Journal of Marine Science and Technology

The focus of this work is to analyze linear deteriorating jobs in a single-machine scheduling problem with due-date assignment and maintenance activity. The linear deteriorating jobs means its processing time is an increasing function of their starting time. The objective is to minimize the total of earliness, tardiness and due-date cost. To solve the scheduling problem addressed in this work, we have to determine the job sequence, the common due-date, and the location of a maintenance activity. We show that the problem can be solved optimally in O(n2 log n) time.


Computation Programs Of The Astronomical Vessel Position, Chih-Li Chen, Tsung-Hsuan Hsieh Feb 2011

Computation Programs Of The Astronomical Vessel Position, Chih-Li Chen, Tsung-Hsuan Hsieh

Journal of Marine Science and Technology

In open sea sailing, as opposed to sailing with satellite navigation systems, the astronomical vessel position (AVP) is not limited by military codes. If programs can be developed to solve the AVP directly, drawbacks of current methods for performing marine operations can be greatly improved. Complete AVP computations have two necessary points: compute the observed altitude and compute the AVP for two bodies. Thus, this paper utilizes Matlab® programming language to develop the observed altitude (ObsAltPro) and the AVP by using intercept method (IMPro-2) programs, respectively. Adopting the ObsAltPro can avoid the use of nautical almanacs and directly obtain the …


Numerical Solutions Of Differential-Algebraic Equations And Its Applications In Solving Tppc Problems, He-Sheng Wang, Wei-Lun Jhu, Chee-Fai Yung, Ping-Feng Wang Feb 2011

Numerical Solutions Of Differential-Algebraic Equations And Its Applications In Solving Tppc Problems, He-Sheng Wang, Wei-Lun Jhu, Chee-Fai Yung, Ping-Feng Wang

Journal of Marine Science and Technology

In this paper, we present a numerical method for solving nonlinear differential algebraic equations (DAE’s) based on the backward differential formulas (BDF) and the Pade series. Usefulness of the method is then illustrated by a numerical example, which is concerned with the derivation of the optimal guidance law for spacecraft. This kind of problems is called trajectory-prescribed path control (TPPC) in the literature. We reformulate the problem as a Hamiltonian DAE system (usually with a higher index). After establishing the system of spacecraft dynamics, we can derive the optimal guidance law of the system by the proposed numerical method.


Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore Jan 2011

Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore

Journal of Digital Forensics, Security and Law

The popularity of Voice over the Internet Protocol (VoIP) is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to criminals, as many implementations use strong encryption to secure both the voice payload as well as to control messages making monitoring such VoIP calls difficult since conventional methods such as wire-tapping is …


Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte Jan 2011

Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte

Journal of Digital Forensics, Security and Law

As Digital Forensics practitioners, we know that our discipline is constantly evolving. Keeping abreast means we need to continually refine and broaden our knowledge pools through experience, education, research, peer exchange, and more. Mobile device forensics can be especially dynamic and challenging. With multiple standards in place at the hardware, operating system, and user interface levels, it can be daunting to preserve, analyze, search and report on these tiny yet ubiquitous hand-held computers. Apple Computer’s line of mobile products (iOS devices - iPhone, iPad, iPod Touch) is no exception to this rule.


Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma Jan 2011

Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma

Journal of Digital Forensics, Security and Law

With the huge volumes of electronic data subject to discovery in virtually every instance of litigation, time and costs of conducting discovery have become exceedingly important when litigants plan their discovery strategies. Rather than incurring the costs of having lawyers review every document produced in response to a discovery request in search of relevant evidence, a cost effective strategy for document review planning is to use statistical sampling of the database of documents to determine the likelihood of finding relevant evidence by reviewing additional documents. This paper reviews and discusses how sampling can be used to make document review more …


Column: Every Last Byte, Simson Garfinkel Jan 2011

Column: Every Last Byte, Simson Garfinkel

Journal of Digital Forensics, Security and Law

Inheritance powder is the name that was given to poisons, especially arsenic, that were commonly used in the 17th and early 18th centuries to hasten the death of the elderly. For most of the 17th century, arsenic was deadly but undetectable, making it nearly impossible to prove that someone had been poisoned. The first arsenic test produced a gas—hardly something that a scientist could show to a judge. Faced with a growing epidemic of poisonings, doctors and chemists spent decades searching for something better