Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
As the course of computer operating system requires students to understand the interactions between computer systems, users and hardware platform, this paper concentrates on the problem of using the virtualization technology in computer operating system teaching. Particularly, virtualization technology is designed to simulate the real computer hardware environment, and then make the operating system...
Data center is a place where data and applications placed and run. Those data and applications saved various server based on function of application run such as server of database, proxy, portal, website, application, mikrotic and so on. The more vary application run, the more server types needed. There are several implications when data center encounter “server flood”, including more electrical energy...
Analyzing the implementation of private cloud and Openstack authentication is necessary to work in an Openstack environment. Private cloud is implemented using Openstack and the aim is to provide a better performance in using Openstack and focus is on the underlying infrastructure on the performance of private cloud deployment.This Openstack is highly beneficial for the Research Centre Communities...
Copy on write technique to modify a shared memory page has been a novel idea by keeping the original page unchanged and modifying a duplicate copy of it. The modifiable content in a page can range from one byte to a complete page. The process which owns the page to be modified is kept suspended until the whole page is copied down. Page copying is done without caring the size of modifiable content...
The clock skew, or the physical ticking rate difference between two digital clocks, has been revealed to have potential on serving as the device fingerprint for identification/authentication purpose. However, it remains as an open issue to detect clock skew replication behavior, which is realized by sending altered timestamps. In this study, it is confirmed that an attacker may fake any target skew...
In cryptographic applications, super long integer operations are often used. However, cryptographic algorithms generally run on a computer with a single-core CPU, and the related computing process is a type of serial execution. In this paper, we investigate how to parallelize the operations of super long integers in multi-core computer environment. The significance of this study lies in that along...
Today the world is under virtually constant attack, targeted by increasingly sophisticated and well funded attackers. The increasing efficacy of cyber threats continues to highlight the inadequacies of traditional defense mechanism such as firewalls and Intrusion Detection System. The security analyst however focuses on finding the technical deficiency but do not consider the adversaries motivations...
There is an increased trend in information insecurity, online fraud and social engineering activities today as a result of high dependence on the Internet and social networks for communication, advertisement of products and services, etc. Malwares are most times, deliberately programmed as worms to appear as flash messages, online games, gift awards and in many other attractive forms for the user...
Digital Forensics is an area of Forensics Science that uses the application of scientific method toward crime investigation. The thwarting of forensic evidence is known as anti-forensics, the aim of which is ambiguous in the sense that it could be bad or good. The aim of this project is to simulate digital crimes scenario and carry out forensic and anti-forensic analysis to enhance security. This...
The generation of representative computer system behavior profile from system calls in LINUX environments to establish reliable Host Based Anomaly Detection Systems (HADS) against Next Generation of Attacks (NGA) is a challenge due to two major reasons. Firstly, NGA causes a low footprint upon host activities and consequently, attack activities are difficult to detect from normal computer processes...
Software keyloggers have been used to spy on computer users to track activity or gather sensitive information for decades. Their primary focus has been to capture keystroke data from physical keyboards. However, since the release of Microsoft Windows 8 in 2012 touchscreen personal computers have become much more prevalent, introducing the use of on-screen keyboards which afford users an alternative...
Empirical studies in software reliability research have predominantly focused on end-user applications. In this paper we present an empirical study on operating system reliability, which considered a sample of 7,007 real operating system failures collected from 566 computers. Our approach considered the clustering of different types of failures, as well as used an algorithm we created to search for...
The operating system is the performance of a computer system hardware abstraction, through which people control the hardware, and to use the resources of the computer system. Course groups is proposed, using a variety of measures to uphold the theory and practice, both innovative strategies to improve teaching effectiveness, develop computer applications personnel. In order to cultivate the students'...
Based on the feature of the operating system course and the practice of teaching, the paper studies the existing problems in the teaching process. We propose improvements on four aspects: update teaching contents, improve teaching methods, strengthen practical teaching and reform the manner of examination. With the help of these improvements, the teaching practice shows that students' learning interest...
Tourism is a potential sector for national income. But in Indonesia, people still have less concern about the importance of tourism. This situation may be caused by the static and uninteresting method to promote Indonesian tourism. A suitable solution is implementing digital signage for e-tourism to increase people attraction to Indonesian tourism. Earlier research has been done to implement digital...
Computer system capability is an essential capability for the computer professional undergraduate students, and the system capacity training becomes an important target for the computer professional education. Computer system design experiment is the key method to achieve this target. This paper introduces the exploration in training computer system capability of the Dept. CS&T Tsinghua University,...
Within the field of computer and information security, there has been a relatively recent surge of interest on a multitude of topics. However, this body of research typically focuses on the implementation or theory of security controls and mechanisms at the application, operating system, network, and physical layers. The user layer, long recognized as the weakest link in the security chain, has had...
This work describes research, efforts, and outcomes for several Computer Science courses after incorporating XSEDE High Performance Computing (HPC) Resources and recommended and required curriculum additions from the ACM 2013 Computer Science Curricula and IEEE Technical Committee on Parallel Processing Curriculum Guidelines. The work herein describes the courses affected by this work, including Computer...
Based on a clear analysis of the latest Windows driver framework WDF, this paper has implemented a driver of the PCIe-SpaceWire interface card device and put forwards a discussion about ensuring the stability of PCIe driver. At the same time, Qt and OpenGL are used to design the upper application. Finally, a functional verification of the control software is provided.
A digital forensics investigation may involve procedures for both live forensics and for gathering evidence from a device in a forensics laboratory. Due to the focus on capturing volatile data during a live forensics investigation, tools have been developed that are aimed at capturing specific data surrounding state information. However, there may be circumstances whereby non-volatile data analysis,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.