Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Journal

2018

Institution
Keyword
Publication

Articles 1 - 30 of 480

Full-Text Articles in Physical Sciences and Mathematics

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig Dec 2018

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig

Journal of Digital Forensics, Security and Law

Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …


Masthead Dec 2018

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover Dec 2018

Cover

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2018

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2018

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Dec 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno Dec 2018

Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno

Elinvo (Electronics, Informatics, and Vocational Education)

Perkembangan ilmu pengetahuan dan teknologi semakin meningkat terutama di bidang elektronika. Hal tersebut menginspirasi peneliti untuk membuat alat yang bersifat ekonomis dan efisien, sehingga mempunyai fungsi utama yaitu untuk mempermudah suatu pekerjaan kader posyandu. Sistem Alat ukur berat badan, tinggi badan dan suhu badan di posyandu berbasis android merupakan pengembangan dari peneliti sebelumnya yang didukung dengan tampilan data angka yang muncul di android untuk mempermudah kader posyandu dalam melihat atau mengamati data angka pada bayi di posyandu. Perancangan alat terdiri dari arduino uno sebagai pengolah data, sensor load cell (berat), sensor ultrasonik (tinggi) dan sensor ds18b20 (suhu) kemudian data angka …


Video Moving Surveillance Yang Terintegrasi Youtube Menggunakan Raspberry Pi 3, Pipit Utami, Abdul Aziz Sidiq Tri Putra, Djoko Santoso, Nuryake Fajaryati, Bonita Destiana, Mohd Erfy Ismail Dec 2018

Video Moving Surveillance Yang Terintegrasi Youtube Menggunakan Raspberry Pi 3, Pipit Utami, Abdul Aziz Sidiq Tri Putra, Djoko Santoso, Nuryake Fajaryati, Bonita Destiana, Mohd Erfy Ismail

Elinvo (Electronics, Informatics, and Vocational Education)

Static CCTV facilities in class need to be optimized in classroom learning, especially in recording learning activities as implementation of learning in the 21st century and strategic steps to face the Industrial Revolution 4.0. Educators need to play a role in utilizing CCTV in learning. This article presents the development of YouTube Integrated Video Moving Surveillance devices using Raspberry Pi 3. The development stages consist of analysis, design, development and evaluation. The analysis shows that: (1) the limitations of CCTV motion are followed up with the addition of motorcycles; (2) limited access to video recording data is followed up by …


Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko Dec 2018

Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko

Elinvo (Electronics, Informatics, and Vocational Education)

SMK Diponegoro 1 Jakarta merupakan lembaga pendidikan pada Yayasan Al-Hidayah Jakarta yang berada di Jakarta Timur. Sebagai lembaga pendidikan yang tergolong lama, SMK Diponegoro 1 Jakarta berkembang dengan pesat, namum belum menerapkan Sistem Informasi dan Teknologi Informasi secara optimal dalam proses bisnisnya dan belum memiliki sebuah portofolio perencanaan strategis Sistem Informasi. Sehingga dipandang perlu dalam membuat sebuah sistem informasi strategis, guna memberikan unggulan dalam persaingan bisnisnya. Perencanaan strategis sistem informasi menjadi salah satu kunci dalam menerapkan sistem informasi dan teknologi informasi pada kegiatan bisnis. Perencanaan strategis yang tepat dapat mendukung rencana dan pengembangan bisnis organisasi. Bentuk perencanaan strategis yang akan …


Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno Dec 2018

Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno

Elinvo (Electronics, Informatics, and Vocational Education)

Data from the Directorate General of Electricity and Energy Development in 1997, the installed capacity of solar electricity in Indonesia reaches 0.88 MW from the available potential of 1.2 x 109 MW. Therefore, this research is made of solar street based lighting design (PJU) as alternative energy that cheap and economical. The work system on the street lighting lighting (PJU) is controlled by an Arduino microcontroller. And use solar panel as source of voltage and light sensor. The light sensor will work and read the intensity of sunlight. During the day the sensor provides input to the arduino so that …


Swot Analysis And Tows Matrix E-Government On Tana Tidung City Of Kalimantan Utara, Rudy Rudy, Abdul Muis Prasetia Dec 2018

Swot Analysis And Tows Matrix E-Government On Tana Tidung City Of Kalimantan Utara, Rudy Rudy, Abdul Muis Prasetia

Elinvo (Electronics, Informatics, and Vocational Education)

ABSTRAct

Information and Communication Technology (ICT) can improve the speed of information delivery, efficiency, global reach and transparency. One of the efforts to realize good corporate governance (GCG) governance in the era of regional autonomy is to use information and communication technology or popularly called e-Government. The implementation of e-Government the need for master plan information technology as a guide in the integration of information technology in Local Government, e-Government implementation is expected to help improve interaction between government, community and business, so as to encourage political and economic development. In this paper presents the determination of e-Government policy strategy …


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang Dec 2018

Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang

Journal of Cybersecurity Education, Research and Practice

Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …


Using Case Studies To Teach Cybersecurity Courses, Yu Cai Dec 2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai

Journal of Cybersecurity Education, Research and Practice

This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


Considering The Non-Programming Geographer's Perspective When Designing Extracurricular Introductory Computer Programming Workshops, Thomas R Etherington Dec 2018

Considering The Non-Programming Geographer's Perspective When Designing Extracurricular Introductory Computer Programming Workshops, Thomas R Etherington

Journal of Spatial Information Science

Computer programming is becoming an increasingly important scientific skill, but geographers are not necessarily receiving this training as part of their formal education. While there are efforts to promote and support extracurricular introductory computer programming workshops, there remain questions about how best to deliver these workshops. Therefore, as part of a recent introductory programming extracurricular workshop I organized for non-programing geographers, I tried to understand more about their perceptions of computer programming. I identify that one of the most important aspects for geographers to learn to computer program is to have training that is domain specific to ensure that the …


Towards Harmonizing Property Measurement Standards, Abdullah Kara, Volkan Çağdaş, Ümit Işıkdağ, Bülent Onur Turan Dec 2018

Towards Harmonizing Property Measurement Standards, Abdullah Kara, Volkan Çağdaş, Ümit Işıkdağ, Bülent Onur Turan

Journal of Spatial Information Science

Area and volume values of buildings and building parts have been used in many applications including taxation, valuation and land use planning. Many countries maintain a national standard for representing the measurements of floor areas in buildings. The national standards generally use similar basis for measuring building floor areas, in fact, areas specified in national standards often have semantic differences. Therefore, a number of international standards have been developed for harmonizing floor area measurements; however, they also have differences. This study aims at harmonizing the floor areas defined in the international property measurement standards by revealing the semantic relations between …


Bridging Space, Time, And Semantics In Giscience, Margarita Kokla, Eric Guilbert, Mir Abolfazl Mostafavi Dec 2018

Bridging Space, Time, And Semantics In Giscience, Margarita Kokla, Eric Guilbert, Mir Abolfazl Mostafavi

Journal of Spatial Information Science

No abstract provided.


Hyper-Local Geographically Weighted Regression: Extending Gwr Through Local Model Selection And Local Bandwidth Optimization, Alexis Comber, Yunqiang Wang, Yihe Lü, Xingchang Zhang, Paul Harris Dec 2018

Hyper-Local Geographically Weighted Regression: Extending Gwr Through Local Model Selection And Local Bandwidth Optimization, Alexis Comber, Yunqiang Wang, Yihe Lü, Xingchang Zhang, Paul Harris

Journal of Spatial Information Science

Geographically weighted regression (GWR) is an inherently exploratory technique for examining process non-stationarity in data relationships. This paper develops and applies a hyper-local GWR which extends such investigations further. The hyper-local GWR simultaneously optimizes both local model selection (which covariates to include in each local regression) and local kernel bandwidth specification (how much data should be included locally). These are evaluated using a measure of model fit. The hyper-local GWR approach evaluates different kernel bandwidths at each location and selects the most parsimonious local regression model. By allowing models and bandwidths to vary locally, this approach extends and refines the …


Georeferencing Places From Collective Human Descriptions Using Place Graphs, Hao Chen, Stephan Winter, Maria Vasardani Dec 2018

Georeferencing Places From Collective Human Descriptions Using Place Graphs, Hao Chen, Stephan Winter, Maria Vasardani

Journal of Spatial Information Science

Place descriptions in everyday communication or in online text provide a rich source of spatial knowledge about places. Such descriptions typically consist of references to places and spatial relationships between them. An important step to utilize such knowledge in information systems is georeferencing the referred places. Beside place name disambiguation, another challenge is that a significant proportion of place references in such descriptions are not official place names indexed by gazetteers, thus cannot be resolved easily. This paper presents a novel approach for georeferencing places from collective descriptions using place graphs, regardless of whether they are referred to by gazetteered …


Towards Place-Based Exploration Of Instagram: Using Co-Design To Develop An Interdisciplinary Geovisualization Prototype, Catherine Emma Jones, Daniele Guido, Marta Severo Dec 2018

Towards Place-Based Exploration Of Instagram: Using Co-Design To Develop An Interdisciplinary Geovisualization Prototype, Catherine Emma Jones, Daniele Guido, Marta Severo

Journal of Spatial Information Science

An abundance of geographic information is hidden within texts and multimedia objects that has the potential to enrich our knowledge about the relationship between people and places. One such example is the geographic information embedded within user-generated content collected and curated by the social media giants. Such geographic data can be encoded either explicitly as geotags or implicitly as geographical references expressed as texts that comprise part of a title or image caption. To use such data for knowledge building there is a need for new mapping interfaces. These interfaces should support both data integration and visualization, and geographical exploration …


Table Of Contents Dec 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Feasibility Of Peltier Chips As Thermoelectric Generators On Heatsinks, Matthew Choquette, Dillon Ranstrom Dec 2018

Feasibility Of Peltier Chips As Thermoelectric Generators On Heatsinks, Matthew Choquette, Dillon Ranstrom

Augsburg Honors Review

As the demand of computer processing grows, the burden placed on CPUs will increase as well. Computing systems produce heat, which is attracted to a metal heatsink where it is dissipated out of the system by a fan. Liquid cooling can be more effective, but is more expensive and increases the risk of damaging leaks. Peltier chips, electronic components which transfer heat into electricity, can be used in an effort to reclaim and reuse some of this waste heat. This experiment tested twelve heatsinks of various designs to maximize the effect of the Peltier chip. Variations in designs of the …


Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub Dec 2018

Bots, Bias And Big Data: Artificial Intelligence, Algorithmic Bias And Disparate Impact Liability In Hiring Practices, Mckenzie Raub

Arkansas Law Review

No abstract provided.


Transient Solution Of An M/M/1 Retrial Queue With Reneging From Orbit, A. Azhagappan, E. Veeramani, W. Monica, K. Sonabharathi Dec 2018

Transient Solution Of An M/M/1 Retrial Queue With Reneging From Orbit, A. Azhagappan, E. Veeramani, W. Monica, K. Sonabharathi

Applications and Applied Mathematics: An International Journal (AAM)

In this paper, the transient behavior of an M/M/1 retrial queueing model is analyzed where the customers in the orbit possess the reneging behavior. There is no waiting room in the system for the arrivals. If the server is not free when the occurrence of an arrival, the arriving customer moves to the waiting group, known as orbit and retries for his service. If the server is idle when an arrival occurs (either coming from outside the queueing system or from the waiting group), the arrival immediately gets the service and leaves the system. Each individual customer in the orbit, …


Batch Arrival Bulk Service Queue With Unreliable Server, Second Optional Service, Two Different Vacations And Restricted Admissibility Policy, G. Ayyappan, R. Supraja Dec 2018

Batch Arrival Bulk Service Queue With Unreliable Server, Second Optional Service, Two Different Vacations And Restricted Admissibility Policy, G. Ayyappan, R. Supraja

Applications and Applied Mathematics: An International Journal (AAM)

This paper is concerned with batch arrival queue with an additional second optional service to a batch of customers with dissimilar service rate where the idea of restricted admissibility of arriving batch of customers is also introduced. The server may take two different vacations (i) Emergency vacation-during service the server may go for vacation to an emergency call and after completion of the vacation, the server continues the remaining service to a batch of customers. (ii) Bernoulli vacation-after completion of first essential or second optional service, the server may take a vacation or may remain in the system to serve …


An M^X/G(A,B)/1 Queue With Breakdown And Delay Time To Two Phase Repair Under Multiple Vacation, G. Ayyappan, M. Nirmala Dec 2018

An M^X/G(A,B)/1 Queue With Breakdown And Delay Time To Two Phase Repair Under Multiple Vacation, G. Ayyappan, M. Nirmala

Applications and Applied Mathematics: An International Journal (AAM)

In this paper, we consider an Mx /G(a,b)/1 queue with active breakdown and delay time to two phase repair under multiple vacation policy. A batch of customers arrive according to a compound Poisson process. The server serves the customers according to the “General Bulk Service Rule” (GBSR) and the service time follows a general (arbitrary) distribution. The server is unreliable and it may breakdown at any instance. As the result of breakdown, the service is suspended, the server waits for the repair to start and this waiting time is called as „delay time‟ and is assumed to follow general …


The Analysis Of M/M/1 Queue With Working Vacation In Fuzzy Environment, G. Kannadasan, N. Sathiyamoorth Dec 2018

The Analysis Of M/M/1 Queue With Working Vacation In Fuzzy Environment, G. Kannadasan, N. Sathiyamoorth

Applications and Applied Mathematics: An International Journal (AAM)

This study investigates the FM/FM/1 queue with working vacation. For this fuzzy queuing model, the researcher obtains some performance measure of interest such as the regular busy period, working vacation period, stationary queue length and waiting time. Finally, numerical results are presented to show the effects of system parameters.


Induced Hesitant 2-Tuple Linguistic Aggregation Operators With Application In Group Decision Making, Tabasam Rashid, Ismat Beg, Raja N. Jamil Dec 2018

Induced Hesitant 2-Tuple Linguistic Aggregation Operators With Application In Group Decision Making, Tabasam Rashid, Ismat Beg, Raja N. Jamil

Applications and Applied Mathematics: An International Journal (AAM)

In this article, hesitant 2-tuple linguistic arguments are used to evaluate the group decision making problems which have inter dependent or inter active attributes. Operational laws are developed for hesitant 2-tuple linguistic elements and based on these operational laws hesitant 2- tuple weighted averaging operator and generalized hesitant 2- tuple averaging operator are proposed. Combining Choquet integral with hesitant 2-tuple linguistic information, some new aggregation operators are defined, including the hesitant 2-tuple correlated averaging operator, the hesitant 2-tuple correlated geometric operator and the generalized hesitant 2-tuple correlated averaging operator. These proposed operators successfully manage the correlations among the elements. After …