The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Genomic analysis [1] usually includes a pipeline of three stages: sequence alignment, data conversion, and advanced analysis. The analysis pipeline needs to handle hundreds of gigabytes of data as well as to run complex analytics algorithms, which traditionally takes long execution time (20+ hours) for a full genomes analysis. Parallelizing the execution of analytics algorithms is one way to speed...
Rising healthcare costs in recent years has become a major issue for many countries. This is especially prominent as baby boomers reaching their retirement age and thus demanding large shares of a country's healthcare resources. Consequently, reducing healthcare cost or waste has become a top priority for many governments. However, integrating and analyzing large amount of healthcare data with variety...
This paper introduces and analyzes fuzzy synthesis evaluation algorithm in scientific way, has studied the problems and defects which appear in the process of this algorithm applying to military software quality evaluation. In this basis, create improved fuzzy evaluation algorithm model which is adaptive to military software quality evaluation characteristic. Utilize improving algorithm models to...
In allusion to the characteristic of military software, constructs multi-Agent fuzzy neural network military software evaluation system which based on Web environment. Discusses multi-Agent communication and message mechanism, designs military software evaluation metrics system and studies self-adjustability fuzzy neural network quality evaluation model. This method can obviously improve the synchronism,...
In order to steal valuable data, hackers are uninterrupted research and development new techniques to intrude computer systems. Opposite to hackers, security researchers are uninterrupted analysis and tracking new malicious techniques for protecting sensitive data. There are a lot of existing analyzers can be used to help security researchers to analyze and track new malicious techniques. However,...
Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with rdquonationalrdquo firewalls, citizen profiling and other rdquounethicalrdquo uses of Information Technology. Current steganographic methods that implement covert...
Behavior-based detection methods have the ability to detect unknown malicious software (malware). The success of behavior-based detection methods must depend on sufficient number of abnormal behavior models. Insufficient number of abnormal behavior models can lead to high false positive and/or false negative rates. The majority of abnormal behavior models can only be derived by observing application...
Active operating system fingerprinting is the process of actively determining a target network system's underlying operating system type and characteristics by probing the target system network stack with specifically crafted packets and analyzing received response. Identifying the underlying operating system of a network host is an important characteristic that can be used to complement network inventory...
The characteristic of Inertial Navigation System (INS) is discussed roundly at the outset, specially the potential application of information on the precision INS (PINS) in terminal guidance. Based on the gimbaled and strapdown inertial navigation system working principles, the output information of INS and PINS is compared, and the information fusion feasibility of Active radar seeker (ARS) and PINS...
Instantaneous polarization measurement radars adopt “simultaneous transmitting, simultaneous receiving” operation scheme, so they can obtain target polarization scattering matrix (PSM) based on only one pair of target echoes. Frequency-shift-pulse-vector waveform is one of narrow band instantaneous polarization measurement waveforms. Based on its transmitted and received signal models, one estimation...
Instantaneous polarization radar can obtain radar target polarization scattering matrix (PSM) by taking advantage of single pulse echo signal. The Polarimetric measurement properties and weak target detection of this system is verified by external field experiment. The actual measured data is used to target classification by applying polarization statistical properties and transformation of target...
Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with "national" firewalls, citizen profiling and other "unethical" uses of information technology. Current steganographic methods that implement...
In order for financial-motivated malware programs such as spyware, virus and worm to survive after system rebooted, they have to modify entries in auto start extensibility points (ASEPs), system calls or system files on a comprised system. We call these system resources which a malware program could attack once it intrudes a host as malware attacking points (MAPs). Based on this observation, we design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.