The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Benchmarking numerous programs in a reasonable time requires the use of several (potentially multicore) computers. We experimented such a situation in the context of the MCC (Model Checking Contest @ Petri net) where we had to operate more than 52000 runs for the 2013 edition. This paper presents BenchKit, a tool to operate programs on sets of potentially parallel machines and to gather monitoring...
Computer game, a new field of artificial intelligence, as the name suggests, is to make the computer learn to think and play chess games like human beings. As one of the important research field of the artificial intelligence, computer game, which is considered as the touchstone of the artificial intelligence, has brought many important methods and theories to the field. Connect6, is a newly introduced...
Segmentation of a scene to the part made is a challenging work. In this paper a graphical model is used for this task. The methods based on geometrical derivatives such as curvature and normal often haven't good result in segmentation of geometrically-complex architecture and lead to over-segmentation and even failure. Proposed method for segmentation contains two steps. At first region growing based...
Carrying out effective and sustainable agriculture product has become an important issue in recent years. Agricultural production has to keep up with an ever-increasing population. A key to this is the usage of modern techniques (for precision agriculture) to take advantage of the quality in the market. The paper reviews various quality evaluation and grading techniques of Oryza Sativa L. (rice) in...
Numerous advanced operating systems honestly hold both time-sliced and multiprocessor threading with a process scheduler. The kernel of an operating system permits programmers to control threads via the system call interface. Java incorporates threading facility within the language itself rather than managing threads as a facility of the underlying operating system. This research finding focuses on...
Face recognition and feature detection plays a vital role in various applications such as human computer interaction, face tracking, video surveillance and face recognition. Efficient face recognition algorithms are required for applying to those tasks. Recently face recognition is attracting a big attention in the social application and also authentication. Face recognition makes hackers virtually...
Stencil computation is a performance critical kernel used in scientific and engineering applications. We define a term of locality of computation to guide stencil optimization by either architecture or compiler. Being analogous to locality of reference, computational behavior is also classified into spatial locality and temporal locality. This paper develops equivalent computation elimination (ECE)...
The Windows CE registry plays a very important role from physical memory and contains lots of important information that are of potential evidential value in forensic analysis. Memory acquisition and analysis is the most important in Windows CE devices forensic. The paper introduces physical memory acquisition and analysis methods in Windows environment and the procedure of memory analysis on the...
Dyslexia is a learning difficulty and in most cases cannot be identified until a child is already in the third grade or later. At this time a dyslexic child have only an one-in-seven chance of ever catching up with his or her peers in reading, writing, speaking or listening. Early identification can pave the way for early intervention and the dyslexic child can be helped at an early stage. Furthermore,...
Host-based intrusion detection systems (HIDSs), especially anomaly-based, have received much attention over the past few decades. Over time, however, the existing data sets used for evaluation of a HIDS have lost most of their relevance due to the substantial development of computer systems. To fill this gap, ADFA Linux data set (ADFA-LD) is recently released, which is composed of thousands of system...
Graph semi-supervised learning (GSSL) is a technique that uses a combination of labeled and unlabeled nodes on a graph to determine a classifier for new, incoming data. This problem can be analyzed through the lens of graph signal processing. In particular, the penalty functions used in the optimization formulation of standard GSSL algorithms can be interpreted as appropriately-defined filters in...
In recent years, information leakage cases happen frequently and are one of big problems. 70% of such a cases are caused by human factors such as mismanagements and/or careless operations. Such a factors can be removed by the control of information flow and/or the check of computer operations. Therefore, some studies to control information flows have been proposed. However, almost studies focus on...
Direct memory access is one of the techniques used in forensic analysis and rootkit detection. Unfortunately, it can also be misused in various attacks. E.g., the firewire attack enabled bypassing of Windows authorization by reading the user password stored in memory. Thus, for security reasons, firewire port is usually disabled in many computers. This motivates a search for a new ways of enabling...
A Python computer program for calculation of distortion in the wide-band diode bridge track and hold amplifier (THA) is proposed. The computer program calculates the distortion of weekly nonlinear THA based on the KCL and the nonlinear-current method with an improved process. Simulations based on a commercially available 130 nm process technology are performed with the SpectreRF simulator. Comparative...
Dynamic code analysis for malware detection has become the heart of modern security tools. Some researchers target Microsoft Detours system to perform the dynamic analysis in window environment. This paper reveals some weakness in Microsoft Detours system. It introduces a mechanism (Anti-Detours) to escape from the code analysis trap. The paper proposes a new technique (Hard-Detours) to perform the...
Virtualization has been widely adopted in current computer systems. A key part of virtualization is a hyper visor, which virtualizes physical resources to be shared among multiple guest virtual machines (VMs). Configuration files and security policy files used by the hyper visor control VMs' behavior. If these critical files are tampered with, all the VMs that run on the same hyper visor will be affected...
The domain name system (DNS) is an essential component of Internet. As it is expected to be used by all legitimate users and applications, generally there are less inspections, restrictions and filters on it. Botnets rely on this open component to accomplish their malicious operation. Therefore, to defeat the single point of failure and evade static blacklists and firewalls, they employ DNS-based...
Cloud computing represents a different paradigm in distributed computing that involves more and more researchers. In this context, we can see that there is a need for knowing where and when a certain data is processed or stored. Compared with classic digital forensic, the field of cloud forensic poses a lot of difficulties since data is not stored on a single storage unit and furthermore it involves...
This paper presents a novel block I/O scheduler specifically for SSDs. The scheduler leverages the internal rich parallelism resulting from SSD's highly parallelized architecture. It speculatively divides the entire SSD space into different subregions and dispatches requests into those subregions in a round-robin fashion at the Linux kernel block layer. In the meanwhile, to reduce the severe read-write...
The paper analyzes the traditional hook and inline hook's imperfection—easily to be detected and be recovered. To improve the inline hook technology, authors put forward a new technology called secret inline hook which has greater confidentiality and can avoid the malware's detection and falsify effectively. The technology has been successfully applied to the automatic analysis system of malware behaviour...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.