Encryption Functionalities When discussing encryption functionalities, Skular (2009) stated, “The primary solutions needed to protect data on a mobile computer [devices] are encryption as well as “remote kill” capabilities” (Skuler, 2009, para. 6). For the...
The origin and history of encryption Forlanda (2013) stated “Cryptography is the science of secret communication, while encryption refers to one component of that science” (para. 1). SANS Institute (2001) provided the following explanation to clarify what “Encryption”...
Data Encryption encryption offers end users a sense of security regarding the protection of sensitive data and/or information—providing defensive cyber strategies against data breach, data exfiltration, and network exploitation through an array of cyber intrusion...
Video Mining With the widespread adoption of video sharing websites, scholars transfer their attention to digital videos mining. The video can be defined as one kind of content-based multimedia data which is typically analyzed from the viewpoint of specific video...
Interactive Advertisement With gaining widespread popularity of adopting web 2.0 nowadays, the video sharing Websites can represent as one of the typically online UGC (user generated content) paradigms. They permit the audience to upload, share, distribute or store...
Performing Digital Forensic on Suspected Drones Performing digital forensic on a drone equipped with Snoopy software or a WASP drone requires tackling the drone components and analyzing their payloads. In a case of WASP, the BackTrack Linux operating system would be...
Use of Modern Small-unmanned Aerial Systems There are three use cases where the modern small-unmanned aerial systems are growing rapidly: public sector, private sector and individual citizens or hobbyists. In Canada, the use of drones in the public sectors include...
Types of Drones Drones come in different types and sizes. They have been referred to as Unmanned Aerial Vehicles (UAVs), drones, pilotless aircraft, robot planes, Remotely Piloted Vehicles (RPVs), Remotely Piloted Aircrafts (RPAs), and other terms that describe...
History of small-unmanned aerial systems Prior to discussion of the above questions, it is important to provide the contextual basis about the use of drones in the United States and the application development capabilities that lead to the need for digital forensics...
Community Supervision Officers and the Digital Forensics Process First, an examination and some background on how parole boards and violations work is necessary. In cases where the supervising officer feels that there has been a violation or is about to be a violation...
Types of Offenders on Community Supervision Community supervision officers supervise offenders convicted of many different types of crimes. However, this paper will be focusing on two specific types of offenders where a need for digital forensics could help monitor...
How Community Supervision Works According to Dressler (1959) & Champion (2005), probation, parole, and community corrections are sanctions that are imposed upon individuals convicted of misdemeanor and felony offenses by a court of law. Probation and...
Attacker Target Selection: Cms Plugins A popular solution for launching a website among both the tech-savvy and the less sophisticated is to utilize a Content Management System (CMS). CMSes, such as WordPress or Joomla, allow webpages to be launched at the click of a...
In order to identify these counterfeit pages automatically, attributes of the pages are needed which suggest either sketchy or legitimate behavior. I developed a feature set based on the manual inspection of many counterfeit sites along with code to reliably extract...
Identification And Analysis Of Websites Selling Counterfeit Goods Counterfeit goods are a pervasive and damaging problem in the online community, robbing brands of their revenue as well as damaging brand images. Getting an exact amount in damages of counterfeit goods...
WIIMOTELIB Nintendo WBB and Nintendo Wii Remote are the controllers for Nintendo Wii system. The controllers for the Wii system communicate via Bluetooth. Because of that, we can leverage these controllers for our game as they communicate via the Bluetooth protocol....
Apertium Apertium was developed as one of the open-source MT systems which originated within the project “Open-Source Machine Translation for the Languages of Spain” (“Traducción automática de código abierto para las lenguas del estado español”) (Forcada et al. 2010)....
FLEx FLEx is a tool that facilitates the recording and analysis of linguistic and anthropological data. It provides a wellordered set of fields to record data. It also provides a means of recording a text corpus with the built-in capability to interlinearize text....
The Rise of the Let’s Play As YouTube algorithms shifted more towards favoring long-form content and minutes viewed rather than specific clicks, LPers found themselves in a perfect storm of media distribution. Most LP sessions can span multiple episodes ranging in...
SomethingAwful and LPs The term “Let’s Play” was coined on the SomethingAwful.com forums in 2007, and is credited to Michael Sawyer (username “SlowBeef” on the SomethingAwful forums) (Saywer, 2013; Klepek). Original LPs were designed to provide user commentary and raw...
Let’s Plays “Let’s Play” media style is deeply rooted in experiencing a product, particularly a video game. In its most basic form, a Let’s Play video combines screenshots or video content from a video game the creator is playing, coupled with the sharing of said...
YouTube Algorithms Algorithms – Pre 2012 The specifics of YouTube’s recommendation algorithm is a heavily-researched but tightly-kept secret. From the site’s inception, YouTube has been recommending videos based on the current content you are watching. On a...
YouTube, Let’s Plays, and Content Creators Early Platform YouTube is a free video upload and streaming service that went live in February of 2005, and was acquired by Google a year and a half later. The structure of YouTube is such that anyone can upload and display...
Virtual Worlds, Collaboration and Meta-Design Collaboration between individuals in a virtual space is a frequently researched topic, often focusing on virtual worlds such as Second Life (Koehne, B., Redmiles, D., & Fischer, G., 2011). The connection between...
Participatory Culture in YouTube A similar bastion of research tying into Let’s Play and YouTube video creation is participatory culture (Jenkins). Put simply, participatory culture is the idea that a backbone of many types of emerging cultures (fandoms, etc.) are...
Content Poachers The use of the term “poachers” with regard to fandoms appropriating content to create their own was a term coined by Henry Jenkins, specifically when addressing Star Trek fanfiction and fan creative creations (Jenkins, 1992), which was in turn based...
POWER RECONFIGURATION ALGORITHMS We present a fast, efficient method for power distribution network reconfiguration. This is a heuristic algorithm for assigning sources to supply as many loads with power as possible, favoring loads of higher priority over loads of...
NETWORK DISCOVERY When a generator stops working or a line becomes faulty, the topology of the network changes. Pathways between sources and loads may no longer be viable. There is no sure way of knowing what components will remain viable because anything in an...
The formal appeals process The first step in the formal appeals process is to appoint a representative that will act on behalf of the organization. The representative may be an attorney, an HIM professional or any professional that can assist and provide expertise in...
Type of Audits in RAC Programs There are three types of RAC reviews: automated, complex and semi-automated review. The automated review, also known as claims review, is an electronic analysis of claims. This type of review is based on algorithms that look for...
Recovery Audit Contractor (RAC) Program The Recovery Audit Contractor (RAC) program is a federal program that identifies and corrects past improper Medicare payments. The purpose of this program is to prevent future improper payments, lower CMS error rates, protect...
Professional Full Body Motion Capture Professional motion capture systems such as Vicon’s systems offer precisions “down to 0.5 mm of translation and 0.5 degrees of rotation” but to create a system with this level of accuracy it requires a large acting space and...
Video Games Fitness and Health Since the early 2000’s video game developers have begun integrating cameras and other tracking peripherals to try to make a more immersive experience. For example the entire Nintendo Wii system was based around a Wii Remote controller...
Resilient Systems AI obstacle. Two issues with advancing AI usage are the lack of extensive knowledge base capabilities, and the ability to learn. The element of complexity appears to be that an AI system must retain a vast spectrum of knowledge and traits that allow...
Mitigating IC Vulnerabilities Service vs. security. The constructs of service before security led to the development of OPC-UA architecture. Business proficiency pushed improvement of the original design of Object Linking and Embedding (OLE). The development of OPC-UA...
Neo4J Applications The graph data model in general and Neo4J specifically renowned for the power and flexibility, and its essential expressiveness. The graph databases application in a real-world problem can be seen as the fast performance of the queries and...
Neo4j Neo4j is the leading application of a property graph database. It is written mainly in Java and leverages a custom storage format and the facilities of the Java Transaction Architecture (JTA) to provide XA transactions. The Java API offers an object-oriented...
NOSQL Databases For over decades, relational databases have been used to store structured data. The data is sub-divided into groups, referred to as tables (Vaish, 2013). The tables store well-defined units of data in terms of type, size, and other constraints. Each...
Dropcam Dropcam, a popular cloud based video monitoring solution, continuously streams to the cloud consuming constant bandwidth. It might waste lot of bandwidth if the recorded clip is never viewed. In our solution the recording is local, and the video clip is shared...
Cloud Storage Options Generally, public cloud storage option has less upfront cost, high accessibility, high resilience to hardware failures, and geographic redundancy. Also, with public cloud we have less control over the saved objects, which in turn might lead to...