Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Journal

2017

Institution
Keyword
Publication

Articles 1 - 30 of 524

Full-Text Articles in Physical Sciences and Mathematics

Pengembangan Sistem Informasi Manajemen Praktik Industri Di Jurusan Pendidikan Teknik Elktronika Uny Berbasis Website Menggunakan Yii Framework, Agung Rizki Subhan Dec 2017

Pengembangan Sistem Informasi Manajemen Praktik Industri Di Jurusan Pendidikan Teknik Elktronika Uny Berbasis Website Menggunakan Yii Framework, Agung Rizki Subhan

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untuk mengembangkan Sistem Informasi Manajemen Praktik Industri di Jurusan Pendidikan Teknik Elektronika Universitas Negeri Yogyakarta. Pengembangan dilakukan pada Juli 2016 sampai Desember 2016 di Jurusan Pendidikan Teknik Elektronika UNY. Pengembangan dilakukan dengan menggunakan model waterfall. Model waterfall terdiri dari analisis kebutuhan sistem, desain sistem, implementasi sistem dan pengujian sistem. Hasil dari penelitian ini adalah software Sistem Informasi Manajemen Praktik Industri di Jurusan Pendidikan Teknik Elektronika UNY berbasis web menggunakan Yii Framework. Fungsionalitas sistem diuji oleh 3 orang penguji yang masing masing menguji 52 fungsi. Dari pengujian tersebut, semua fungsi yang telah diuji dapat berjalan dengan baik. Sehingga, …


Analisis Prinsip Layout And Composition Pada Web Design Perusahaan Pt. Bank Rakyat Indonesia, Tbk Dan Pt. Fif Group Berdasarkan Buku "The Principle Of Beautifull Website Design (2nd Edition) By Jason Beaird", Heri Kuswanto Dec 2017

Analisis Prinsip Layout And Composition Pada Web Design Perusahaan Pt. Bank Rakyat Indonesia, Tbk Dan Pt. Fif Group Berdasarkan Buku "The Principle Of Beautifull Website Design (2nd Edition) By Jason Beaird", Heri Kuswanto

Elinvo (Electronics, Informatics, and Vocational Education)

Kajian ini bertujuan untuk mengetahui prinsip-prinsip desain web yang menarik berdasarkan buku "The Principle of The Beatiful Website Design (2nd edition) by Jason Beaird yang difokuskan pada prinsip Layout and Composition, sekaligus menjawab apakah perusahaan yang memiliki divisi IT menerapkan prinsip tersebut. Metode yang digunakan adalah pendekatan studi kasus, dengan tujuh variabel yakni web page anatomy, grid theory, balance, unity, emphasis, fresh trend dan resizing: fixed, fluid, or responsive layouts. Kajian dilakukan dengan menganalisis dan membandingkan dua buah website perusahaan nasional dengan hasil yang menunjukkan bahwa rancangan website lebih dipengaruhi oleh faktor pandangan dari sisi kegunaan dan estetika.



Analisis Desain Website Bni, Bukopin, J.Co Donuts Dan Mcdonals Menurut Buku "The Principles Of Beautiful Web Design", Fitria Ekarini Dec 2017

Analisis Desain Website Bni, Bukopin, J.Co Donuts Dan Mcdonals Menurut Buku "The Principles Of Beautiful Web Design", Fitria Ekarini

Elinvo (Electronics, Informatics, and Vocational Education)

Paper ini bertujuan untuk mengetahui hasil analisis desain beberapa tampilan website berdasarkan teori "The Principle Beautiful Web Design" menggunakan tujuh variabel antara lain Defining good Design, Web Page Anatomy, Grid Theory, Balance, Unity, Bread and Butter Layout dan Fresh Trends. Penelitian ini membandingkan empat website yang terdiri 2 jenis website perbankan dan 2 jenis food company. yaitu website BNI, website Bank BUKOPIN, website Jco Donuts, dan website McDonals. Hasilnya didapatkan bahwa website food company lebih baik dalam desain tampilan websitenya dibandingan dengan website perbankan. Dalam website food company hampir seluruh variabel digunakan dalam mendesain tampilan websitenya.


Rancang Bangun Aplikasi E-Report Pengaduan Masyarakat Design Public Complaint E-Report Application, Roviana H. Dai Dec 2017

Rancang Bangun Aplikasi E-Report Pengaduan Masyarakat Design Public Complaint E-Report Application, Roviana H. Dai

Elinvo (Electronics, Informatics, and Vocational Education)

Ombudsman RI merupakan lembaga negara yang bertugas menerima laporan dugaan maladministrasi. Ombudsman RI perwakilan provinsi Gorontalo menerima jumlah laporan yang cukup signifikan setiap tahunnya yaitu 122 laporan ditahun 2014, 138 laporan ditahun 2015 dan 146 laporan sepanjang tahun 2016. Tingginya beban penyelesaian laporan setiap Asisten mengakibatkan laporan-laporan jadi tidak tertanggulangi. Adapun tujuan dari penelitian ini yaitu mengusulkan sebuah sistem yang dapat menjadi early warning system, reminder/pengingat sekaligus membantu dalam monitoring laporan baik oleh internal Ombudsman maupun masyarakat sebagai Pelapor. Sistem yang akan dibuat menggunakan fitur sms gateway dan sistem berbasiskan web. Hasil dari penelitian ini yaitu dibuatkannya …


Analisis Aplikasi Jadwal Perkuliahan Berbasis Android, Daniswara Galuh Sukmandari Dec 2017

Analisis Aplikasi Jadwal Perkuliahan Berbasis Android, Daniswara Galuh Sukmandari

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untuk menganalisis kualitas perangkat lunak pada aplikasi mobile jadwal perkuliahan berdasarkan standar kualitas ISO 25010 ysng mencakup aspek funtional suitability, compatibility, usability, dan performance efficiency. Metode yang digunakan dalam penelitian adalah Research and Development (R&D) dengan model waterfall. Hasil dari penelitian adalah aplikasi jadwal perkuliahan telah memenuhi standar kualitas perangkat lunak berdasarkan standar ISO 25010. Pengujian functional suitabilitymendapatkan hasil sebesar 100% yang berarti fungsi aplikasi telah berjalan dengan benar.Pengujian compatibilitymendapatkan hasil sebesar 100%. Pengujian usabilitymendapatkan hasil sebesar 79,63% dengan kategori Layak. Pengujian performance efficiencymendapatkan rata-rata waktu launchingsebesar 2,048 detik dan 0,095 detik untuk rata-rata waktu rendering


Sistem Pendukung Keputusan Klinis Untuk Memprediksi Kejadian Asfiksia Neonatorum, Efi Laila Latifah Dec 2017

Sistem Pendukung Keputusan Klinis Untuk Memprediksi Kejadian Asfiksia Neonatorum, Efi Laila Latifah

Elinvo (Electronics, Informatics, and Vocational Education)

Asfiksia neonatorum merupakan kegawatdaruratan bayi baru lahir berupa depresi pernafasan yang berlanjut sehingga menimbulkan berbagai komplikasi bahkan mengakibatkan kematian. Menurut RISKESDAS Indonesia 2007, 78,5% kematian bayi merupakan kematian neonatal dini dengan penyebab terbesar karena asfiksia neonatorum. Oleh karena itu diperlukan suatu alat untuk mendeteksi dini potensi atau resiko kejadian asfiksia neonatorum pada setiap kehamilan. Identifikasi dini tersebut dapat dilakukan dengan mengaplikasikan Rule Based Reasoning dengan metode Forward Chaining yang dilanjutkan dengan Case Based Reasoning dalam sebuah sistem. Sistem yang dikembangkan dalam penelitian ini menghasilkan output berupa prediksi skor APGAR neonatus. Hasil pengujian sistem dalam penelitian ini menunjukkan bahwa penerimaan sistem …


Pengujian Kualitas Kelayakan Perangkat Lunak Dengan Penerapanperancangan Model Rapid Application Development, Hari Toha Hidayat Dec 2017

Pengujian Kualitas Kelayakan Perangkat Lunak Dengan Penerapanperancangan Model Rapid Application Development, Hari Toha Hidayat

Elinvo (Electronics, Informatics, and Vocational Education)

Membangun suatu perangkat lunak yang berkualitas tidaklah mudah. Banyak hal yang harus diperhatikan dalam membuat suatu perangkat lunak yang berkualitas. Semakin berkualitas suatu perangkat lunak atau aplikasi maka akan semakin mahal harga yang dijual. Perangkat lunak yang berkualitas tidak hanya sekedar mencari keuntungan belaka akan tetapi mutu dari kualitas dan kuantitasnya yang sudah menjadi jaminan dari aplikasi yang ditawarkan. Pembuatan suatu perangkat lunak yang berkualitas selalu memperhatikan kebutuhan akan penggunanya, sehingga mampu memberikan solusi dari permasalahan yang dihadapi oleh para penggunanya. Selain itu, suatu aplikasi yang berkualitas selalu melalui tahapan - tahapan pengujian yang tidak singkat sehingga benar - benar …


Evaluasi Kualitas Aplikasi Mobile Kamus Istilah Jaringan Pada Platform Android Dengan Standar Iso/Iec 25010, Rohmad Dwi Jayanto Dec 2017

Evaluasi Kualitas Aplikasi Mobile Kamus Istilah Jaringan Pada Platform Android Dengan Standar Iso/Iec 25010, Rohmad Dwi Jayanto

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untuk menguji aplikasi mobile kamus istilah jaringan komputer pada platform android menggunakan standar kualitas perangkat lunak ISO/IEC 25010 pada aspek functional suitability, compatibility, performance efficiency, danusability. Metode yang digunakan adalah research and development. Hasil dari penelitian ini menunjukkan bahwa aplikasi telah memenuhi standar ISO/IEC 25010 pada aspek (1) functional suitability seluruh fungsi dari aplikasi berjalan 100% yang artinya tidak ada fungsi yang gagal saat dilakukan pengujian, (2) compatibility aplikasi kompatibel 100% darisisico-existence, berbagai sistem operasi dan tipe perangkat yang digunakan untuk pengujian, (3) performance efficiency aplikasi berhasil dijalankan di 436 dari 452 perangkatuji AWS Device …


Uji Kelayakan Sistem Informasi Unit Kesehatan Sekolah Berbasis Website Di Smk Muhammadiyah 1 Bantul Dengan Faktor Kualitas Mccall, Daya Prisandi Mandala Dec 2017

Uji Kelayakan Sistem Informasi Unit Kesehatan Sekolah Berbasis Website Di Smk Muhammadiyah 1 Bantul Dengan Faktor Kualitas Mccall, Daya Prisandi Mandala

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untukmengetahuitingkatkelayakan Sistem Informasi Unit Kesehatan Sekolah Berbasis Website di SMK Muhammadiyah 1 Bantul. Metode yang digunakan dalam penelitian ini adalahkuantitatif. Prosedur pengujiandalam penelitian ini adalah White-Box Testing, Black-Box Testing, Alpha Testing dan Beta Testing. Objek penelitian ini adalah perangkat lunak Sistem Informasi Unit Kesehatan Sekolah Berbasis Website di SMK Muhammadiyah 1 Bantul. Teknik pengumpulan data dilakukan dengan kuesioner. Analisis data menggunakan analisis data kuantitatif. Hasil penelitian yang diperolehdariujikelayakan terhadap Sistem Informasi Unit Kesehatan Sekolah Berbasis Website di SMK Muhammadiyah 1 Bantul dengan menggunakan faktor kualitas McCall, diperoleh hasil kelayakan oleh ahli menyatakan Layak dan pengguna menyatakan …


Pengujian Functionality Dan Performance Sistem Inforamasi Berbasis Web Menggunakan Framework Codeigniter Di Smk Negeri 1 Jogonalan Klaten, Patan Pindoyono Dec 2017

Pengujian Functionality Dan Performance Sistem Inforamasi Berbasis Web Menggunakan Framework Codeigniter Di Smk Negeri 1 Jogonalan Klaten, Patan Pindoyono

Elinvo (Electronics, Informatics, and Vocational Education)

Penelitian ini bertujuan untuk menganalisis kualitas sistem informasi alumni berbasis web menggunakan framework CodeIgniter sehingga mampu: (1) mengurangi kesalahan pengelolaan data alumni SMK N 1 Jogonalan. (2) menyingkat waktu pencarian data alumni SMK N 1 Jogonalan. Pengujian yang digunakan pada penelitian ini adalah aspek functionality suitability dan aspek performance efficiency. Aspek functionality menggunakan test case yang mengacu pada analisis kebutuhan perangkat lunak. Sedangkan aspek performance efficiency dilakukan dengan menghitung waktu rata-rata respon dari sistem sebanyak lima kali percobaan. Hasil penelitian yang telah dilakukan menunjukan bahwa: (1) Sistem informasi yang dikembangkan dapat mengurangi kesalahan pegelolaan data, hal ini dibuktikan pada pada …


A Cutting-Plane Method For Contiguity-Constrained Spatial Aggregation, Johannes Oehrlein, Jan-Henrik Haunert Dec 2017

A Cutting-Plane Method For Contiguity-Constrained Spatial Aggregation, Johannes Oehrlein, Jan-Henrik Haunert

Journal of Spatial Information Science

Aggregating areas into larger regions is a common problem in spatial planning, geographic information science, and cartography. The aim can be to group administrative areal units into electoral districts or sales territories, in which case the problem is known as districting. In other cases, area aggregation is seen as a generalization or visualization task, which aims to reveal spatial patterns in geographic data. Despite these different motivations, the heart of the problem is the same: given a planar partition, one wants to aggregate several elements of this partition to regions. These often must have or exceed a particular size, be …


Insight Provenance For Spatiotemporal Visual Analytics: Theory, Review, And Guidelines, Andreas Hall, Paula Ahonen-Rainio, Kirsi Virrantaus Dec 2017

Insight Provenance For Spatiotemporal Visual Analytics: Theory, Review, And Guidelines, Andreas Hall, Paula Ahonen-Rainio, Kirsi Virrantaus

Journal of Spatial Information Science

Research on provenance, which focuses on different ways to describe and record the history of changes and advances made throughout an analysis process, is an integral part of visual analytics. This paper focuses on providing the provenance of insight and rationale through visualizations while emphasizing, first, that this entails a profound understanding of human cognition and reasoning and that, second, the special nature of spatiotemporal data needs to be acknowledged in this process. A recently proposed human reasoning framework for spatiotemporal analysis, and four guidelines for the creation of visualizations that provide the provenance of insight and rationale published in …


Vgi In Surveying Engineering: Introducing Collaborative Cloud Land Surveying, Ioannis Sofos, Vassilios Vescoukis, Maria Tsakiri Dec 2017

Vgi In Surveying Engineering: Introducing Collaborative Cloud Land Surveying, Ioannis Sofos, Vassilios Vescoukis, Maria Tsakiri

Journal of Spatial Information Science

olunteered geographic information (VGI) has enabled many innovative applications in various scientific fields. This paper introduces a new framework called "collaborative cloud-based land surveying" (CCLS) that uses VGI principles for data sharing among surveyor engineers to boost the productivity and improve the quality of their applications. A cloud-based spatio-temporal data repository is presented, aiming to facilitate the sharing of VGI among surveyor engineers. A fully-functional distributed software application has been developed and used to apply CCLS in a large-scale land surveying project run by the Greek Ministry of Culture, which involves the mapping of the historic center of Athens. Results …


Sailing: Cognition, Action, Communication, Thora Tenbrink, Frank Dylla Dec 2017

Sailing: Cognition, Action, Communication, Thora Tenbrink, Frank Dylla

Journal of Spatial Information Science

How do humans perceive and think about space, and how can this be represented adequately? For everyday activities such as locating objects or places, route planning, and the like, many insights have been gained over the past few decades, feeding into theories of spatial cognition and frameworks for spatial information science. In this paper, we explore sailing as a more specialized domain that has not yet been considered in this way, but has a lot to offer precisely because of its peculiarities. Sailing involves ways of thinking about space that are not normally required (or even acquired) in everyday life. …


Editorial, Matt Duckham Dec 2017

Editorial, Matt Duckham

Journal of Spatial Information Science

No abstract provided.


Fundamentals Of Satellite Remote Sensing: An Environmental Approach 2e, Luke Wallace Dec 2017

Fundamentals Of Satellite Remote Sensing: An Environmental Approach 2e, Luke Wallace

Journal of Spatial Information Science

Book review of Fundamentals of Satellite Remote Sensing: An Environmental Approach 2e" by Emilio Chuvieco"


Quantifying Space, Understanding Minds: A Visual Summary Approach, Mark Simpson, Kai-Florian Richter, Jan Oliver Wallgrün, Alexander Klippel Dec 2017

Quantifying Space, Understanding Minds: A Visual Summary Approach, Mark Simpson, Kai-Florian Richter, Jan Oliver Wallgrün, Alexander Klippel

Journal of Spatial Information Science

This paper presents an illustrated, validated taxonomy of research that compares spatial measures to human behavior. Spatial measures quantify the spatial characteristics of environments, such as the centrality of intersections in a street network or the accessibility of a room in a building from all the other rooms. While spatial measures have been of interest to spatial sciences, they are also of importance in the behavioral sciences for use in modeling human behavior. A high correlation between values for spatial measures and specific behaviors can provide insights into an environment's legibility, and contribute to a deeper understanding of human spatial …


Modeling And Manipulating Spacetime Objects In A True 4d Model, Ken Arroyo Ohori, Hugo Ledoux, Jantien Stoter Dec 2017

Modeling And Manipulating Spacetime Objects In A True 4d Model, Ken Arroyo Ohori, Hugo Ledoux, Jantien Stoter

Journal of Spatial Information Science

The concept of spacetime has long been used in physics to refer to models that integrate 3D space and time as a single 4D continuum. We argue in this paper that it is also advantageous to use this concept in a practical geographic context by realizing a true 4D model, where time is modeled and implemented as a dimension in the same manner as the three spatial dimensions. Within this paper we focus on 4D vector objects, which can be implemented using dimension-independent data structures such as generalized maps. A 4D vector model allows us to create and manipulate models …


Cognitively Plausible Representations For The Alignment Of Sketch And Geo-Referenced Maps, Sahib Jan, Angela Schwering, Carl Schultz, Malumbo Chaka Chipofya Dec 2017

Cognitively Plausible Representations For The Alignment Of Sketch And Geo-Referenced Maps, Sahib Jan, Angela Schwering, Carl Schultz, Malumbo Chaka Chipofya

Journal of Spatial Information Science

In many geo-spatial applications, freehand sketch maps are considered as an intuitive way to collect user-generated spatial information. The task of automatically mapping information from such hand-drawn sketch maps to geo-referenced maps is known as the alignment task. Researchers have proposed various qualitative representations to capture distorted and generalized spatial information in sketch maps, however thus far the effectiveness of these representations has not been evaluated in the context of an alignment task. This paper empirically evaluates a set of cognitively plausible representations for alignment using real sketch maps collected from two different study areas with the corresponding geo-referenced maps. …


Topological Augmentation: A Step Forward For Qualitative Partition Reasoning, Matthew P. Dube Dec 2017

Topological Augmentation: A Step Forward For Qualitative Partition Reasoning, Matthew P. Dube

Journal of Spatial Information Science

The current state of the art for partition based qualitative spatial reasoning systems such as the 9-intersection, 9+-intersection, direction relation matrix, and peripheral direction relations is that of the binary set intersection — either empty or non-empty — conveying the intersection (or lack thereof) of an object in the sets deriving the partition. While such representations are sufficient for topological components of objects, these representations are not sufficient for various tasks in qualitative spatial reasoning (composition, representation transfer, converse, etc.) regarding partitions as tiles. Topological augmentation expands the current binary status quo into a system of assigning topological relations between …


Visual Odometry Using Convolutional Neural Networks, Alec Graves, Steffen Lim, Thomas Fagan, Kevin Mcfall Phd. Dec 2017

Visual Odometry Using Convolutional Neural Networks, Alec Graves, Steffen Lim, Thomas Fagan, Kevin Mcfall Phd.

The Kennesaw Journal of Undergraduate Research

Visual odometry is the process of tracking an agent's motion over time using a visual sensor. The visual odometry problem has only been recently solved using traditional, non-machine learning techniques. Despite the success of neural networks at many related problems such as object recognition, feature detection, and optical flow, visual odometry still has not been solved with a deep learning technique. This paper attempts to implement several Convolutional Neural Networks to solve the visual odometry problem and compare slight variations in data preprocessing. The work presented is a step toward reaching a legitimate neural network solution.


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth Dec 2017

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer Dec 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer

Journal of Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi Dec 2017

Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi

Journal of Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell Dec 2017

Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell

Journal of Cybersecurity Education, Research and Practice

Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland Dec 2017

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr. Dec 2017

Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.

Journal of Digital Forensics, Security and Law

Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content …


Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell Dec 2017

Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell

Journal of Digital Forensics, Security and Law

Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an …


Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie, Simon Maina Karume Dr. Dec 2017

Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie, Simon Maina Karume Dr.

Journal of Digital Forensics, Security and Law

With the evolution in digital technologies, organizations have been forced to change the way they plan, develop, and enact their information technology strategies. This is because modern digital technologies do not only present new opportunities to business organizations but also a different set of issues and challenges that need to be resolved. With the rising threats of cybercrimes, for example, which have been accelerated by the emergence of new digital technologies, many organizations as well as law enforcement agencies globally are now erecting proactive measures as a way to increase their ability to respond to security incidents as well as …


Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald Dec 2017

Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald

Journal of Digital Forensics, Security and Law

Consumer grade broadband routers are integral to accessing the Internet and are primarily responsible for the reliable routing of data between networks. Despite the importance of broadband routers, security has never been at the forefront of their evolution. Consumers are often in possession of broadband routers that are rich in consumer-orientated features yet riddled with vulnerabilities that make the routers susceptible to exploitation. This amalgamation of theoretical research examines consumer grade broadband routers from the perspective of how they evolved, what makes them vulnerable, how they are targeted and the challenges concerning the application of security. The research further explores …