Encryption Functionalities

Encryption Functionalities When discussing encryption functionalities, Skular (2009) stated, “The primary solutions needed to protect data on a mobile computer [devices] are encryption as well as “remote kill” capabilities” (Skuler, 2009, para. 6). For the...

The origin and history of encryption

The origin and history of encryption Forlanda (2013) stated “Cryptography is the science of secret communication, while encryption refers to one component of that science” (para. 1). SANS Institute (2001) provided the following explanation to clarify what “Encryption”...

Data Encryption

Data Encryption encryption offers end users a sense of security regarding the protection of sensitive data and/or information—providing defensive cyber strategies against data breach, data exfiltration, and network exploitation through an array of cyber intrusion...

Video Mining And Two Step Clustering Analysis

Video Mining With the widespread adoption of video sharing websites, scholars transfer their attention to digital videos mining. The video can be defined as one kind of content-based multimedia data which is typically analyzed from the viewpoint of specific video...

Interactive Advertisement

Interactive Advertisement With gaining widespread popularity of adopting web 2.0 nowadays, the video sharing Websites can represent as one of the typically online UGC (user generated content) paradigms. They permit the audience to upload, share, distribute or store...

Performing Digital Forensic on Suspected Drones

Performing Digital Forensic on Suspected Drones Performing digital forensic on a drone equipped with Snoopy software or a WASP drone requires tackling the drone components and analyzing their payloads. In a case of WASP, the BackTrack Linux operating system would be...

Use of Modern Small-unmanned Aerial Systems

Use of Modern Small-unmanned Aerial Systems There are three use cases where the modern small-unmanned aerial systems are growing rapidly: public sector, private sector and individual citizens or hobbyists. In Canada, the use of drones in the public sectors include...

Types of Drones

Types of Drones Drones come in different types and sizes. They have been referred to as Unmanned Aerial Vehicles (UAVs), drones, pilotless aircraft, robot planes, Remotely Piloted Vehicles (RPVs), Remotely Piloted Aircrafts (RPAs), and other terms that describe...

History of small-unmanned aerial systems

History of small-unmanned aerial systems Prior to discussion of the above questions, it is important to provide the contextual basis about the use of drones in the United States and the application development capabilities that lead to the need for digital forensics...

Types of Offenders on Community Supervision

Types of Offenders on Community Supervision Community supervision officers supervise offenders convicted of many different types of crimes. However, this paper will be focusing on two specific types of offenders where a need for digital forensics could help monitor...

How Community Supervision Works

How Community Supervision Works According to Dressler (1959) & Champion (2005), probation, parole, and community corrections are sanctions that are imposed upon individuals convicted of misdemeanor and felony offenses by a court of law. Probation and...

Attacker Target Selection: Cms Plugins

Attacker Target Selection: Cms Plugins A popular solution for launching a website among both the tech-savvy and the less sophisticated is to utilize a Content Management System (CMS). CMSes, such as WordPress or Joomla, allow webpages to be launched at the click of a...

Feature Extraction Of Websites Selling Counterfeit Goods

In order to identify these counterfeit pages automatically, attributes of the pages are needed which suggest either sketchy or legitimate behavior. I developed a feature set based on the manual inspection of many counterfeit sites along with code to reliably extract...

WIIMOTELIB

WIIMOTELIB Nintendo WBB and Nintendo Wii Remote are the controllers for Nintendo Wii system. The controllers for the Wii system communicate via Bluetooth. Because of that, we can leverage these controllers for our game as they communicate via the Bluetooth protocol....

Apertium

Apertium Apertium was developed as one of the open-source MT systems which originated within the project “Open-Source Machine Translation for the Languages of Spain” (“Traducción automática de código abierto para las lenguas del estado español”) (Forcada et al. 2010)....

FLEx

FLEx FLEx is a tool that facilitates the recording and analysis of linguistic and anthropological data. It provides a wellordered set of fields to record data. It also provides a means of recording a text corpus with the built-in capability to interlinearize text....

The Rise of the Let’s Play

The Rise of the Let’s Play As YouTube algorithms shifted more towards favoring long-form content and minutes viewed rather than specific clicks, LPers found themselves in a perfect storm of media distribution. Most LP sessions can span multiple episodes ranging in...

SomethingAwful and LPs

SomethingAwful and LPs The term “Let’s Play” was coined on the SomethingAwful.com forums in 2007, and is credited to Michael Sawyer (username “SlowBeef” on the SomethingAwful forums) (Saywer, 2013; Klepek). Original LPs were designed to provide user commentary and raw...

Let’s Plays

Let’s Plays “Let’s Play” media style is deeply rooted in experiencing a product, particularly a video game. In its most basic form, a Let’s Play video combines screenshots or video content from a video game the creator is playing, coupled with the sharing of said...

YouTube Algorithms

YouTube Algorithms Algorithms – Pre 2012 The specifics of YouTube’s recommendation algorithm is a heavily-researched but tightly-kept secret. From the site’s inception, YouTube has been recommending videos based on the current content you are watching. On a...

YouTube, Let’s Plays, and Content Creators

YouTube, Let’s Plays, and Content Creators Early Platform YouTube is a free video upload and streaming service that went live in February of 2005, and was acquired by Google a year and a half later. The structure of YouTube is such that anyone can upload and display...

Virtual Worlds, Collaboration and Meta-Design

Virtual Worlds, Collaboration and Meta-Design Collaboration between individuals in a virtual space is a frequently researched topic, often focusing on virtual worlds such as Second Life (Koehne, B., Redmiles, D., & Fischer, G., 2011). The connection between...

Participatory Culture in YouTube

Participatory Culture in YouTube A similar bastion of research tying into Let’s Play and YouTube video creation is participatory culture (Jenkins). Put simply, participatory culture is the idea that a backbone of many types of emerging cultures (fandoms, etc.) are...

Content Poachers

Content Poachers The use of the term “poachers” with regard to fandoms appropriating content to create their own was a term coined by Henry Jenkins, specifically when addressing Star Trek fanfiction and fan creative creations (Jenkins, 1992), which was in turn based...

POWER RECONFIGURATION ALGORITHMS

POWER RECONFIGURATION ALGORITHMS We present a fast, efficient method for power distribution network reconfiguration. This is a heuristic algorithm for assigning sources to supply as many loads with power as possible, favoring loads of higher priority over loads of...

NETWORK DISCOVERY

NETWORK DISCOVERY When a generator stops working or a line becomes faulty, the topology of the network changes. Pathways between sources  and loads may no longer be viable. There is no sure way of knowing what components will remain viable because anything in  an...

The formal appeals process

The formal appeals process The first step in the formal appeals process is to appoint a representative that will act on behalf of the organization. The representative may be an attorney, an HIM professional or any professional that can assist and provide expertise in...

Type of Audits in RAC Programs

Type of Audits in RAC Programs There are three types of RAC reviews: automated, complex and semi-automated review. The automated review, also known as claims review, is an electronic analysis of claims. This type of review is based on algorithms that look for...

Recovery Audit Contractor (RAC) Program

Recovery Audit Contractor (RAC) Program The Recovery Audit Contractor (RAC) program is a federal program that identifies and corrects past improper Medicare payments. The purpose of this program is to prevent future improper payments, lower CMS error rates, protect...

Video Games Fitness and Health

Video Games Fitness and Health Since the early 2000’s video game developers have begun integrating cameras and other tracking peripherals to try to make a more immersive experience. For example the entire Nintendo Wii system was based around a Wii Remote controller...

Resilient Systems

Resilient Systems AI obstacle. Two issues with advancing AI usage are the lack of extensive knowledge base capabilities, and the ability to learn. The element of complexity appears to be that an AI system must retain a vast spectrum of knowledge and traits that allow...

Mitigating IC Vulnerabilities

Mitigating IC Vulnerabilities Service vs. security. The constructs of service before security led to the development of OPC-UA architecture. Business proficiency pushed improvement of the original design of Object Linking and Embedding (OLE). The development of OPC-UA...

Neo4J Applications

Neo4J Applications The graph data model in general and Neo4J specifically renowned for the power and flexibility, and its essential expressiveness. The graph databases application in a real-world problem can be seen as the fast performance of the queries and...

Neo4j

Neo4j Neo4j is the leading application of a property graph database. It is written mainly in Java and leverages a custom storage format and the facilities of the Java Transaction Architecture (JTA) to provide XA transactions. The Java API offers an object-oriented...

NOSQL Databases

NOSQL Databases For over decades, relational databases have been used to store structured data. The data is sub-divided into groups, referred to as tables (Vaish, 2013). The tables store well-defined units of data in terms of type, size, and other constraints. Each...

Dropcam and InstaGENI rack

Dropcam Dropcam, a popular cloud based video monitoring solution, continuously streams to the cloud consuming constant bandwidth. It might waste lot of bandwidth if the recorded clip is never viewed. In our solution the recording is local, and the video clip is shared...

Cloud Storage Options and Firewall/NAT Traversal

Cloud Storage Options Generally, public cloud storage option has less upfront cost, high accessibility, high resilience to hardware failures, and geographic redundancy. Also, with public cloud we have less control over the saved objects, which in turn might lead to...