The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is a prime concern in today's era of technology when dealing with digital data. All the information is managed by the file system which is the core layer of security in an Operating System. Due to lack of security at this layer, private information can be accessed by an intruder or in case of theft data can be read via mounting it on to a mount point and accessing the information. Other layer...
Gender classification has found application in a myriad of fields such as surveillance, interaction between humans and computers, face recognition and most recently in digital signage for gender-targeted advertising. There are several existing methods of gender classification such as Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Support Vector Machines (SVM). All these...
Numerous advanced operating systems honestly hold both time-sliced and multiprocessor threading with a process scheduler. The kernel of an operating system permits programmers to control threads via the system call interface. Java incorporates threading facility within the language itself rather than managing threads as a facility of the underlying operating system. This research finding focuses on...
Dynamic code analysis for malware detection has become the heart of modern security tools. Some researchers target Microsoft Detours system to perform the dynamic analysis in window environment. This paper reveals some weakness in Microsoft Detours system. It introduces a mechanism (Anti-Detours) to escape from the code analysis trap. The paper proposes a new technique (Hard-Detours) to perform the...
This paper introduces the User-level Remote Swap Library, URSL, which enables memory-homogeneous Grid execution. This is obtained by letting the Grid infrastructure supply a remote memory bank to the connected resources. Insufficient memory at the contribution computer resource in a Grid is a major limitation when users seek to get high throughput in a Grid infrastructure, simply because a number...
Cloud computing is characterized today by a hotchpotch of elements and solutions, namely operating systems running on a single virtualized computing environment, middleware layers that attempt to combine physical and virtualized resources from multiple operating systems, and specialized application engines that leverage a key asset of the cloud service provider (e.g. Google's BigTable). Yet, there...
Parallel programming and distributed programming are two solutions for scientific applications to provide high performance and fast response time in parallel systems and distributed systems. Parallel and distributed systems must provide inter process communication (IPC) mechanisms like message passing mechanism as underlying platforms to enable communication between local and especially geographically...
Scientific applications like weather forecasting require high performance and fast response time. But this ideal requirement has always been constrained by peculiarities of underlying platforms specially distributed platforms. One such constraint is the efficiency of communication between geographically dispersed and physically distributed processes running these applications, that is the efficiency...
This paper presents methods towards making an operating system malicious activity conscious. In addition to the existing focus of operating systems mainly on resource and user management, we propose that an operating system should also try to prevent the execution of malicious code such as viruses and worms. Exploiting the fact that malicious code/programs require services from the operating system...
The Radiation Safety Information Computational Center (RSICC) has been in existence since 1963. RSICC collects, organizes, evaluates and disseminates technical information (software and nuclear data) involving the transport of neutral and charged particle radiation, and shielding and protection from the radiation associated with: nuclear weapons and materials, fission and fusion reactors, outer space,...
Construct a new type man-machine graphical interface for inertial navigation system, this new type GUI is built by using Qt/embedded graphical library under the environment of embedded Linux OS. Transplant the Linux operating system to the PC104 computer. Realize the across platform development between Linux and Windows OS by using Qt/embedded graphical library. At last the hardware and software design...
In today's operating system, memory management policies based on the data-copying and hidden mechanisms blocks the system performance which is far from expectation. This paper introduces an innovative memory management system powered by vertical architecture PVM. The paper first describes the model and architecture of PVM, followed by an analysis of lazy management of virtual address space and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.