Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

2009

Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 90 of 221

Full-Text Articles in Physical Sciences and Mathematics

Design Of Acousto-Optic Chaos Based Secure Free-Space Optical Communication Links, Anjan K. Ghosh, Pramode K. Verma, Samuel Cheng, Robert C. Huck, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi Aug 2009

Design Of Acousto-Optic Chaos Based Secure Free-Space Optical Communication Links, Anjan K. Ghosh, Pramode K. Verma, Samuel Cheng, Robert C. Huck, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi

Electrical and Computer Engineering Faculty Publications

We discuss the design of an acousto-optic cell based free space optical communication link where the data beam is made secure through chaos encryption. Using external signal modulation of the diffracted light from a hybrid acousto-optic cell chaos (or directly via incorporation in the sound-cell driver's bias voltage) encryption of data is possible. We have shown numerically that decryption of the encoded data is possible by using an identical acousto-optic system in the receiver.


The Very Basics Of Sustainability - An Alternative Viewpoint (Slides With Audio) (Large File! To Speed Up Download, Right-Click On "Download" Link To Save To Own Pc.), Jim Mcgovern Aug 2009

The Very Basics Of Sustainability - An Alternative Viewpoint (Slides With Audio) (Large File! To Speed Up Download, Right-Click On "Download" Link To Save To Own Pc.), Jim Mcgovern

Other resources

This presentation sets out the very basics of ‘sustainability’, although a definition of sustainability is not attempted. Some of the very basics are the context in which the Earth and humankind exist in space and time, the Earth’s climate, the Earth’s population and humankind’s options and choices. The author advocates keeping an open mind on all available options, including the use of oil, gas, coal, tar sands, carbon capture and sequestration, nuclear power etc., as well as the technologies that are more widely considered ‘green’. The author also argues that, in addressing the challenges that humankind faces, globally concerted effort …


Rfid-Based Smart Freezer, Ahmet Soylemezoglu, Maciej Jan Zawodniok, Jagannathan Sarangapani Jul 2009

Rfid-Based Smart Freezer, Ahmet Soylemezoglu, Maciej Jan Zawodniok, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

This paper presents a novel radio-frequency identification (RFID)-based smart freezer using a new inventory-management scheme for extremely low temperature environments. The proposed solution utilizes backpressure inventory control, systematic selection of antenna configuration, and antenna power control. The proposed distributed-inventory-control (DIC) scheme dictates the amount of items transferred through the supply chain. when a high item visibility is ensured, the control scheme maintains the desired level of inventory at each supply-chain echelon. The performance of the DIC scheme is guaranteed using a Lyapunov-based analysis. The proposed RFID antenna-configuration design methodology coupled with locally asymptotically stable distributed power control ensures a 99% …


Optimal Control Of Unknown Affine Nonlinear Discrete-Time Systems Using Offline-Trained Neural Networks With Proof Of Convergence, Travis Dierks, Balaje T. Thumati, S. Jagannathan Jul 2009

Optimal Control Of Unknown Affine Nonlinear Discrete-Time Systems Using Offline-Trained Neural Networks With Proof Of Convergence, Travis Dierks, Balaje T. Thumati, S. Jagannathan

Electrical and Computer Engineering Faculty Research & Creative Works

The optimal control of linear systems accompanied by quadratic cost functions can be achieved by solving the well-known Riccati equation. However, the optimal control of nonlinear discrete-time systems is a much more challenging task that often requires solving the nonlinear Hamilton-Jacobi-Bellman (HJB) equation. in the recent literature, discrete-time approximate dynamic programming (ADP) techniques have been widely used to determine the optimal or near optimal control policies for affine nonlinear discrete-time systems. However, an inherent assumption of ADP requires the value of the controlled system one step ahead and at least partial knowledge of the system dynamics to be known. in …


Brain Tumor Progression Assessment Using Multiple Mri Volumes, Yufei Shen Jul 2009

Brain Tumor Progression Assessment Using Multiple Mri Volumes, Yufei Shen

Electrical & Computer Engineering Theses & Dissertations

Predicting and assessing tumor progression is important in brain tumor treatment. We attempt to use machine learning techniques to achieve consistency in assessing brain tumor progression. This thesis presents a prediction method of brain tumor progression by exploring a large MR database, which contains two patients ' complete records covering all their visits in the past two years. All ten MRI series, namely, apparent diffusion coefficient (ADC) , diffusion tensor imaging (DTI) , fractional anisotropy (FA), fluid attenuated inversion recovery (FLAIR), max eigenvalue (MAX), mid eigenvalue (MID), min eigenvalue (MIN) , post-contrast T1-weighted, T1- weighted, and …


A Simulation Study Of Convergence Speed For Distributed Codeword Adaptation Algorithms In Cdma Wireless Systems, Sahana Maharjan Jul 2009

A Simulation Study Of Convergence Speed For Distributed Codeword Adaptation Algorithms In Cdma Wireless Systems, Sahana Maharjan

Electrical & Computer Engineering Theses & Dissertations

In this thesis we present a side-by-side comparison of interference avoidance (IA) algorithms for distributed codeword adaptation in Code Division Multiple Access (CDMA) systems. In CDMA systems, the interference is determined by the values of the cross-correlation of codewords assigned to users, and various algorithms can be used for codeword optimization. The IA algorithms for codeword adaptation considered are the eigen-algorithm, the Minimum Mean Square Error (MMSE) update, and the adaptive IA algorithm, for which we investigate convergence speed using the extensive simulations of several uplink CDMA system scenarios. The results of this thesis were presented at the Fourth IEEE …


Analysis Of Partial Discharge Pulse Height Distribution Parameters, Vinay N. Nimbole Jul 2009

Analysis Of Partial Discharge Pulse Height Distribution Parameters, Vinay N. Nimbole

Electrical & Computer Engineering Theses & Dissertations

Partial Discharges (PD) have been traditionally used to assess the state of any insulation system and its remnant life. In earlier work, Perspex (PMMA) samples with a needle plane gap have been aged with AC voltage. Their tree growth was monitored simultaneously by collecting PD at regular intervals of time and taking microphotographs in real time without interrupting the aging voltage. The obtained partial discharge pulse amplitude records were clustered together into groups of class intervals. The sequence of PD pulse height records was quantified as a time series of shape (η), and scale (σ) parameters of a Weibull distribution. …


Developing Large-Scale Bayesian Networks By Composition: Fault Diagnosis Of Electrical Power Systems In Aircraft And Spacecraft, Ole J. Mengshoel, Scott Poll, Tolga Kurtoglu Jun 2009

Developing Large-Scale Bayesian Networks By Composition: Fault Diagnosis Of Electrical Power Systems In Aircraft And Spacecraft, Ole J. Mengshoel, Scott Poll, Tolga Kurtoglu

Ole J Mengshoel

In this paper, we investigate the use of Bayesian networks to construct large-scale diagnostic systems. In particular, we consider the development of large-scale Bayesian networks by composition. This compositional approach reflects how (often redundant) subsystems are architected to form systems such as electrical power systems. We develop high-level specifiations, Bayesian networks, clique trees, and arithmetic circuits representing 24 different electrical power systems. The largest among these 24 Bayesian networks contains over 1,000 random variables. Another BN represents the real-world electrical power system ADAPT, which is representative of electrical power systems deployed in aerospace vehicles. In addition to demonstrating the scalability …


Diagnosis And Reconfiguration Using Bayesian Networks: An Electrical Power System Case Study, W. Bradley Knox, Ole J. Mengshoel Jun 2009

Diagnosis And Reconfiguration Using Bayesian Networks: An Electrical Power System Case Study, W. Bradley Knox, Ole J. Mengshoel

Ole J Mengshoel

Automated diagnosis and reconfiguration are important computational techniques that aim to minimize human intervention in autonomous systems. In this paper, we develop novel techniques and models in the context of diagnosis and reconfiguration reasoning using causal Bayesian networks (BNs). We take as starting point a successful diagnostic approach, using a static BN developed for a real-world electrical power system. We discuss in this paper the extension of this diagnostic approach along two dimensions, namely: (i) from a static BN to a dynamic BN; and (ii) from a diagnostic task to a reconfiguration task.

More specifically, we discuss the auto-generation of …


Characterization Of An N2 Flowing Microwave Post-Discharge By Oes Spectroscopy And Determination Of Absolute Ground-State Nitrogen Atom Densities By Talif, Et. Es-Sebbar, Y. Benilan, A. Jolly, M-C. Gazeau Jun 2009

Characterization Of An N2 Flowing Microwave Post-Discharge By Oes Spectroscopy And Determination Of Absolute Ground-State Nitrogen Atom Densities By Talif, Et. Es-Sebbar, Y. Benilan, A. Jolly, M-C. Gazeau

Dr. Et-touhami Es-sebbar

A flowing microwave post-discharge source sustained at 2.45 GHz in pure nitrogen has been investigated by optical emission spectroscopy (OES) and two-photon absorption laser-induced fluorescence (TALIF) spectroscopy. Variations of the optical emission along the post-discharge (near, pink and late afterglow) have been studied and the gas temperature has been determined. TALIF spectroscopy has been used in the late afterglow to determine the absolute ground-state nitrogen atomic densities using krypton as a reference gas. Measurements show that the microwave flowing post-discharge is an efficient source of N (4S) atoms in late afterglow. In our experimental conditions, the maximum N (4S) density …


An Efficient And Effective Implementation Of The Trust System For Power Grid Compartmentalization, Juan M. Carlos Gonzalez Jun 2009

An Efficient And Effective Implementation Of The Trust System For Power Grid Compartmentalization, Juan M. Carlos Gonzalez

Theses and Dissertations

As utility companies develop and incorporate new technologies, such as moving to utility Internet technology based architecture and standard; it is crucial that we do so with history in mind. We know that traditional utility protection and control systems were not designed with security in their top priorities. This presents a danger in an environment where near real-time responses are required to ensure safe operations. As a consequence, system security becomes a burden to the system rather than necessary protection. Unfortunately, technology implementation is not the only concern. The number of utility privately-owned companies has multiplied as the market has …


Probability Density Functions For Snir In Ds-Cdma, David W. Matolak Jun 2009

Probability Density Functions For Snir In Ds-Cdma, David W. Matolak

Faculty Publications

Analytical expressions for the probability density function of block-wise signal-to-noise-plus-interference ratio for both synchronous and asynchronous direct-sequence spread spectrum code-division multiple access systems are developed, for equal average energy signals on the Gaussian and Rayleigh flat fading channels. Using the standard Gaussian approximation for multi-user interference, accurate density approximations are obtained, which agree very well with computer simulation results.


The Diagnostic Challenge Competition: Probabilistic Techniques For Fault Diagnosis In Electrical Power Systems, Brian W. Ricks, Ole J. Mengshoel May 2009

The Diagnostic Challenge Competition: Probabilistic Techniques For Fault Diagnosis In Electrical Power Systems, Brian W. Ricks, Ole J. Mengshoel

Ole J Mengshoel

Reliable systems health management is an important research area of NASA. A health management system that can accurately and quickly diagnose faults in various on-board systems of a vehicle will play a key role in the success of current and future NASA missions. We introduce in this paper the ProDiagnose algorithm, a diagnostic algorithm that uses a probabilistic approach, accomplished with Bayesian Network models compiled to Arithmetic Circuits, to diagnose these systems. We describe the ProDiagnose algorithm, how it works, and the probabilistic models involved. We show by experimentation on two Electrical Power Systems based on the ADAPT testbed, used …


The Accelerated Test Of Simulated Atmospheric Corrosion And The Rust Evolution Of Low Carbon Steel, Jun-Hua Dong, Wei Ke May 2009

The Accelerated Test Of Simulated Atmospheric Corrosion And The Rust Evolution Of Low Carbon Steel, Jun-Hua Dong, Wei Ke

Journal of Electrochemistry

It has been set up an accelerated method of simulating to atmospheric corrosion by using wet/dry alternate test.The rust evolution rule of mass change vs time(in logarithmic coordinate) of low carbon steel under this test shows two linear sections with different slopes,in which the rust evolution transition in weight change corresponds to the compactness transition and crystallization transition during the rust layer growth.It has found that the rust evolution rule of low carbon steel in Wanning exposure site correlates to the rust evolution rule obtained by simulating the coastal atmospheric corrosion test,and the rust evolution rule of low carbon steel …


Investigation Of Electrochemical Noise In The Crevice Corrosion Of Q235 Carbon Cteel, Qian Hu, Yu-Bing Qiu, Xing-Peng Guo May 2009

Investigation Of Electrochemical Noise In The Crevice Corrosion Of Q235 Carbon Cteel, Qian Hu, Yu-Bing Qiu, Xing-Peng Guo

Journal of Electrochemistry

The crevice corrosion behavior of Q235 carbon steels in a NaHCO3+NaCl solution was investigated by electrochemical noise(EN) and electrochemical impedance spectroscopy(EIS).Three stages of crevice corrosion including the induction,the rapid transform and the stable development could be clearly distinguished.The characteristics of the electrochemical noise and the noise resistance Rn showed remarkable differences at each stage.The electrode area ratio(r) of outside to inside the crevice had a significant influence in the development of crevice corrosion.The time of the induction stage increased with increasing r.However,under the stable development stage of the crevice corrosion,the surface outside the crevice was at an active dissolution state …


Electro-Oxidation Of Methanol On Fe-Doped Pt-Zro_2/C Catalyst, Mao-Cai Lin, Dong-Dong Liu, Qing-Chun Yu, Ming-Ruo Hu, Heng-Yong Tu May 2009

Electro-Oxidation Of Methanol On Fe-Doped Pt-Zro_2/C Catalyst, Mao-Cai Lin, Dong-Dong Liu, Qing-Chun Yu, Ming-Ruo Hu, Heng-Yong Tu

Journal of Electrochemistry

The Fe-doped ZrO2 powders were prepared by so-gel method.After that,Pt-Zr1-xFexO2/C catalysts were made by reducing platinum salts with ethylene glycol.The physical property of the catalyst was characterized by XRD and TEM.It was found that the distribution of the catalyst was narrow,the particle sizes of Pt and ZrO2 particles were 2~4 nm and 3~7 nm,respectively.The Cyclic Voltammetry and Chronoamperometry testing indicated that the electro-catalytic activity for methanol electro-oxidation on Pt-ZrO2/C catalyst increased when ZrO2 was doped with Fe.And Pt-Zr0.95Fe0.05O2/C catalyst showed the highest activity for the electro-oxidation of methanol.


Preparation And Electrochemical Properties Of Layered Manganese Oxide(Li-Birnessite Type), Xing-Kang Huang, Hai-Tao Chang, Jian-Long Gan, Qing-Shun Zhang, Hong-Jun Yue, Dong-Ping Lv, Yong Yang May 2009

Preparation And Electrochemical Properties Of Layered Manganese Oxide(Li-Birnessite Type), Xing-Kang Huang, Hai-Tao Chang, Jian-Long Gan, Qing-Shun Zhang, Hong-Jun Yue, Dong-Ping Lv, Yong Yang

Journal of Electrochemistry

Layered Li-birnessite was prepared by means of oxidizing Mn2+ with O2 gas in alkaline media.The as-prepared sample was characterized by scanning electron microscopy(SEM),X-ray diffraction(XRD),BET and thermogravimetric/diffenential thermal analysis(TG/DTA) techniques.The electrochemical properties of the material were also investigated.The results show that such a Li-birnessite consists of well-crystallized spherical particles with an interlayer distance of 0.70 nm.The Li-birnessite delivered a high discharge capacity of 203 mAh/g at a rate of 0.2 C(40 mA/g),and had good rate capability as well.


Effects Of Kscn On Kinetic Characters Of The Positive Couple And Performance For Vanadium Redox Flow Battery, Jian-Guo Liu, Dong Shi, Yue Men, Chuan-Wei Yan May 2009

Effects Of Kscn On Kinetic Characters Of The Positive Couple And Performance For Vanadium Redox Flow Battery, Jian-Guo Liu, Dong Shi, Yue Men, Chuan-Wei Yan

Journal of Electrochemistry

In order to improve the reaction activity of VO2+/VO2+ and the battery performance of Vanadium redox flow battery,different concentration of potassium sulfocyanates KSCN were added into 0.1mol/L VOSO4/ H2SO4 solution,and the kinetic characters of electrochemical reaction of VO2+/VO2+ was studied by CV and EIS.The results showed that the addition of KSCN could improve the oxidative peak current value of positive couple VO2+/VO2+ reaction,but had little influence in the reductive peak.The addition of KSCN decreased the impedance at 1.0 V.And the value of standard rate constant k0 was also improved with the concentration of KSCN increased.The total coulomb during the charge …


Electrochemical Performance Of The Exfoliated Graphite Containing Sulfur Cathode Material For Lithium Sulfur Battery, Ke-Guo Yuan, Wei-Kun Wang, Zhong-Bao Yu, An-Bang Wang May 2009

Electrochemical Performance Of The Exfoliated Graphite Containing Sulfur Cathode Material For Lithium Sulfur Battery, Ke-Guo Yuan, Wei-Kun Wang, Zhong-Bao Yu, An-Bang Wang

Journal of Electrochemistry

The exfoliated graphite containing sulfur cathode material was prepared by the high temperature sulfur gas diffusion adsorption method.This cathode material could obtain an initial discharge specific capacity 972 mAh·g-1,capacity retention ratio 78% and cycling efficiency above 80%,respectively.The exfoliated graphite containing sulfur cathode could decrease the reaction interphase charge transfer impedance,and restrain the sulfur or polysulfide shuttle phenomenon during the charge-discharge process through improving the diffusion impedance.


Electrode Of Metallic Oxides Coated Titanium With Interlayer, Yi Tang, Li-Kun Xu, Yong-Lei Xin, Jun-Tao Wang, Ping Long May 2009

Electrode Of Metallic Oxides Coated Titanium With Interlayer, Yi Tang, Li-Kun Xu, Yong-Lei Xin, Jun-Tao Wang, Ping Long

Journal of Electrochemistry

Various Ti/IrRuSn,Ti/IrTa/IrRuSn and Ti/IrTaSn/IrRuSn oxide electrodes were prepared by sol-gel method.The surface morphology and microstructure were analysed with FESEM and XRD.The electrochemical activity and stability were investigated using electrochemical technologies including chlorine and oxygen evolving potential measurements,cyclic voltammetry,accelerated life test,and alternative electrolysis.The results indicate that the electrodes with interlayers present more cracks on the surface and a little bigger average grain size,with particles of different shapes precipitated in the cracks.The electroactive sites are increased and the selectivity for the chlorine evolving reaction is enhanced,but the current efficiency for the chlorine production is somewhat lowered by the addition of different interlayers.The …


Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill May 2009

Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill

Annual ADFSL Conference on Digital Forensics, Security and Law

The London 2012 Olympics is just three years away and the clock is ticking to put in place plans get it right. The potential for cybercrime to cause harm during this event is very great; harm to national reputation, harm to the reputation to the Olympic movement, and harm to individuals competing, watching or officiating. This paper considers the need to address these risks by taking a look at what has happened in the past at sporting events and the rising wave of electronic security threats and fraud facilitated by computers at recent Olympics. The problems for law enforcement are …


Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski May 2009

Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski

Annual ADFSL Conference on Digital Forensics, Security and Law

When investigators from either the private or public sector review digital data surrounding a case for evidentiary value, they typically conduct a systematic categorization process to identify the relevant digital devices. Armed with the proper methodology to accomplish this task, investigators can quickly recognize the appropriate digital devices for forensic processing and review. This paper purposes a methodology for investigating an individual’s online social networking persona.

Keywords: Social Networking, Web 2.0, Internet Investigations, Online Social Networking Community


Interview With Kirk Davis, Glumac International, 2009 (Audio), Kirk Davis May 2009

Interview With Kirk Davis, Glumac International, 2009 (Audio), Kirk Davis

All Sustainability History Project Oral Histories

Interview of Kirk Davis by Jay Fielding at Glumac International, Portland, Oregon on May 22nd, 2009.

The interview index is available for download.


Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler May 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking


Concerning File Slack, Stephen P. Larson May 2009

Concerning File Slack, Stephen P. Larson

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we discuss the phenomena known as file slack. File slack is created each time a file is created on a hard disk, and can contain private or confidential data. Unfortunately, the methods used by Microsoft Windows operating systems to organize and save files require file slack, and users have no control over what data is saved in file slack. This document will help create awareness about the security issue of file slack and discuss research results concerning file slack.

Keywords : Computer Forensics, File Slack, Ram Slack, Disk Slack


Don’T Touch That! And Other E-Discovery Issues, Linda Volonino May 2009

Don’T Touch That! And Other E-Discovery Issues, Linda Volonino

Annual ADFSL Conference on Digital Forensics, Security and Law

The ability to preserve and access electronically stored information (ESI) took on greater urgency when amendments to the Federal Rules of Civil Procedure went into effect in December 2006. These amendments, referred to as the electronic discovery (e-discovery) amendments, focus on the discovery phase of civil litigation, audits, or investigations. Discovery is the investigative phase of a legal case when opponents learn what evidence is available and how accessible it is. When ESI is the subject of discovery, it is called e-discovery. Recognizing that most business and personal records and communications are electronic, Judge Shira A. Scheindlin stated, "We used …


The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma May 2009

The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the most unanticipated results of the Computer Fraud and Abuse Act arose from the law of unintended consequences. The CFAA was originally enacted in 1984 to protect federal government computers from intrusions and damage caused by hackers, identity thieves, and other cyber criminals. The law was later amended to extend the scope of its application to financial institutions’, business’s and consumers’ computers. To aid in the pursuit of cyber criminals, one of the subsequent revisions to the law included provision “G” that gave the right to private parties to seek compensation for damages in a civil action for …


Why Are We Not Getting Better At Data Disposal?, Andy Jones May 2009

Why Are We Not Getting Better At Data Disposal?, Andy Jones

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes two sets of research, the first of which has been carried out over a period of four years into the levels and types of information that can be found on computer hard disks that are offered for sale on the second hand market. The second research project examined a number of second-hand hand held devices including PDAs, mobile (cell) phones and RIM Blackberry devices. The primary purpose of this research was to gain an understanding of the reasons for the failure to effectively remove potentially sensitive information from the disks and handheld devices. Other objectives included determining …


Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi May 2009

Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

The Windows Registry stores a wide variety of data representing a host of different user properties, settings and program information. The data structures used by the registry are designed to be adaptable to store these differences in a simple format. In this paper we will highlight the existence of a rare data structure that is used to store a large amount of data within the registry hives. We analyse the manner in which this data structure stores its data and the implications that it may have on evidence retrieval and digital investigation. In particular, we reveal that the three of …


Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi May 2009

Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We …