To see the other types of publications on this topic, follow the link: Drive-by download.

Journal articles on the topic 'Drive-by download'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Drive-by download.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

ZHANG, Hui-Lin, Wei ZOU, and Xin-Hui HAN. "Drive-by-Download Mechanisms and Defenses." Journal of Software 24, no. 4 (January 14, 2014): 843–58. http://dx.doi.org/10.3724/sp.j.1001.2013.04376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sood, Aditya K., and Sherali Zeadally. "Drive-By Download Attacks: A Comparative Study." IT Professional 18, no. 5 (September 2016): 18–25. http://dx.doi.org/10.1109/mitp.2016.85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Javed, Amir, Pete Burnap, and Omer Rana. "Prediction of drive-by download attacks on Twitter." Information Processing & Management 56, no. 3 (May 2019): 1133–45. http://dx.doi.org/10.1016/j.ipm.2018.02.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Javed, Amir, Pete Burnap, Matthew L. Williams, and Omer F. Rana. "Emotions Behind Drive-by Download Propagation on Twitter." ACM Transactions on the Web 14, no. 4 (September 4, 2020): 1–26. http://dx.doi.org/10.1145/3408894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nag, Amruth, and Sowmya M S. "Solution for Deceptive Download Buttons and Drive-By Installation." International Journal of System Modeling and Simulation 3, no. 4 (December 30, 2018): 1. http://dx.doi.org/10.24178/ijsms.2018.3.4.01.

Full text
Abstract:
Deceptive download buttons are those on the internet which may look like it is meant to do an action but actually does something else which it is not intended by the user. Drive-by installations are those extra software which is installed in a user's device without him noticing it. This paper gives the information about the types of deceptive download buttons and the ways a common user can avoid clicking on such button while browsing the web. A few methods the advertiser may commonly use for making the end user a victim of the deceptive download buttons is discussed here. The methods by which someone can avoid these kinds of buttons are also given in this paper. An idea for the development of an extension to the user's browser, that runs in the background. This warns the user about those buttons prior to the button being clicked. This paper also includes information about drive-by installations of bloatware and the ways in which the end users are being affected by this, how the end user can avoid being a victim of drive-by installations and an idea to develop a tool which runs in the background as a small script in the operating system which will automatically warn the user about the drive-by installations.
APA, Harvard, Vancouver, ISO, and other styles
6

Aldwairi, Monther, Musaab Hasan, and Zayed Balbahaith. "Detection of Drive-by Download Attacks Using Machine Learning Approach." International Journal of Information Security and Privacy 11, no. 4 (October 2017): 16–28. http://dx.doi.org/10.4018/ijisp.2017100102.

Full text
Abstract:
Drive-by download refers to attacks that automatically download malwares to user's computer without his knowledge or consent. This type of attack is accomplished by exploiting web browsers and plugins vulnerabilities. The damage may include data leakage leading to financial loss. Traditional antivirus and intrusion detection systems are not efficient against such attacks. Researchers proposed plenty of detection approaches mostly passive blacklisting. However, a few proposed dynamic classification techniques, which suffer from clear shortcomings. In this paper, we propose a novel approach to detect drive-by download infected web pages based on extracted features from their source code. We test 23 different machine learning classifiers using data set of 5435 webpages and based on the detection accuracy we selected the top five to build our detection model. The approach is expected to serve as a base for implementing and developing anti drive-by download programs. We develop a graphical user interface program to allow the end user to examine the URL before visiting the website. The Bagged Trees classifier exhibited the highest accuracy of 90.1% and reported 96.24% true positive and 26.07% false positive rate.
APA, Harvard, Vancouver, ISO, and other styles
7

TAKATA, Yuta, Mitsuaki AKIYAMA, Takeshi YAGI, Takeo HARIU, and Shigeki GOTO. "MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks." IEICE Transactions on Information and Systems E99.D, no. 4 (2016): 860–72. http://dx.doi.org/10.1587/transinf.2015icp0013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jayasinghe, Gaya K., J. Shane Culpepper, and Peter Bertok. "Efficient and effective realtime prediction of drive-by download attacks." Journal of Network and Computer Applications 38 (February 2014): 135–49. http://dx.doi.org/10.1016/j.jnca.2013.03.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hsu, Fu-Hau, Chang-Kuo Tso, Yi-Chun Yeh, Wei-Jen Wang, and Li-Han Chen. "BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks." IEEE Journal on Selected Areas in Communications 29, no. 7 (August 2011): 1461–68. http://dx.doi.org/10.1109/jsac.2011.110811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nappa, Antonio, M. Zubair Rafique, and Juan Caballero. "The MALICIA dataset: identification and analysis of drive-by download operations." International Journal of Information Security 14, no. 1 (June 21, 2014): 15–33. http://dx.doi.org/10.1007/s10207-014-0248-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Naumov, A., N. Vlajic, and H. Roumani. "Geotracking of webpage sources: a defence against drive-by-download attacks." International Journal of Internet Technology and Secured Transactions 4, no. 4 (2012): 312. http://dx.doi.org/10.1504/ijitst.2012.054061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

De Santis, Alfredo, Giancarlo De Maio, and Umberto Ferraro Petrillo. "Using HTML5 to prevent detection of drive-by-download web malware." Security and Communication Networks 8, no. 7 (August 21, 2014): 1237–55. http://dx.doi.org/10.1002/sec.1077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

AKIYAMA, Mitsuaki, Makoto IWAMURA, Yuhei KAWAKOYA, Kazufumi AOKI, and Mitsutaka ITOH. "Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks." IEICE Transactions on Communications E93-B, no. 5 (2010): 1131–39. http://dx.doi.org/10.1587/transcom.e93.b.1131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Rosati, Dora P., Matthew H. Woolhouse, Benjamin M. Bolker, and David J. D. Earn. "Modelling song popularity as a contagious process." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 477, no. 2253 (September 2021): 20210457. http://dx.doi.org/10.1098/rspa.2021.0457.

Full text
Abstract:
Popular songs are often said to be ‘contagious’, ‘infectious’ or ‘viral’. We find that download count time series for many popular songs resemble infectious disease epidemic curves. This paper suggests infectious disease transmission models could help clarify mechanisms that contribute to the ‘spread’ of song preferences and how these mechanisms underlie song popularity. We analysed data from MixRadio, comprising song downloads through Nokia cell phones in Great Britain from 2007 to 2014. We compared the ability of the standard susceptible–infectious–recovered (SIR) epidemic model and a phenomenological (spline) model to fit download time series of popular songs. We fitted these same models to simulated epidemic time series generated by the SIR model. Song downloads are captured better by the SIR model, to the same extent that actual SIR simulations are fitted better by the SIR model than by splines. This suggests that the social processes underlying song popularity are similar to those that drive infectious disease transmission. We draw conclusions about song popularity within specific genres based on estimated SIR parameters. In particular, we argue that faster spread of preferences for Electronica songs may reflect stronger connectivity of the ‘susceptible community’, compared with the larger and broader community that listens to more common genres.
APA, Harvard, Vancouver, ISO, and other styles
15

Han, KyungHyun, and Seong Oun Hwang. "Lightweight Detection Method of Obfuscated Landing Sites Based on the AST Structure and Tokens." Applied Sciences 10, no. 17 (September 3, 2020): 6116. http://dx.doi.org/10.3390/app10176116.

Full text
Abstract:
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed. In particular, the redirection JavaScript in the landing site is obfuscated to avoid detection systems. In this paper, we propose a lightweight detection system based on static analysis to classify the obfuscation type and to promptly detect the obfuscated redirection JavaScript. The proposed model detects the obfuscated redirection JavaScript by converting the JavaScript into an abstract syntax tree (AST). Then, the structure and token information are extracted. Specifically, we propose a lightweight AST to identify the obfuscation type and the revised term frequency-inverse document frequency to efficiently detect the malicious redirection JavaScript. This approach enables rapid identification of the obfuscated redirection JavaScript and proactive blocking of the webpages that are used in drive-by-download attacks.
APA, Harvard, Vancouver, ISO, and other styles
16

P., Tatwadarshi, J. W. Bakal, and Neha Jain. "A Brief Survey of Detection and Mitigation Techniques for Clickjacking and Drive-by Download Attacks." International Journal of Computer Applications 138, no. 2 (March 17, 2016): 44–48. http://dx.doi.org/10.5120/ijca2016908785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Jonas, Oliver, and Ibrahim Sirkeci. "Understanding determinants of illegal e-book downloading behaviour in the UK and Germany." Transnational Marketing Journal 6, no. 2 (November 1, 2018): 79–100. http://dx.doi.org/10.33182/tmj.v6i2.595.

Full text
Abstract:
With the success of e-books in the last decade, e-book piracy has become increasingly prevalent. This is a significant threat to the publishing industry, publishers and authors alike. Despite efforts to inhibit illegal downloading of e-book files, unauthorized download platforms have not lost much popularity. One of the underlying problems is a limited understanding of the determinants that drive consumers in their choice between legal and illegal download options. This article identifies and critically evaluates the key product attributes in the decision-making process of consumers downloading e-books from legal and illegal sources. By providing consumer insights, the publishing industry and e-book sellers can be guided to meet consumer demand better and design marketing plans to attract consumers towards legal download sources and discourage e-book piracy. The consumer choice between legal and illegal e-book download platforms is analysed using the multi-attribute theory for consumer decision making. 23 attributes were tested using an online questionnaire and analysed by logistic regression. Three attributes were found to be significant in determining the choice of download platforms: A low perception of the importance of copyright compliance, dissatisfaction with the security of download platforms and dissatisfaction with e-book prices in online stores.
APA, Harvard, Vancouver, ISO, and other styles
18

Weber, Matthew, Veronica L. Armour, Calandra Lindstadt, and Itzhak Yanovitzky. "Testing Multiple Methods to Effectively Promote Use of a Knowledge Portal to Health Policy Makers: Quasi-Experimental Evaluation." Journal of Medical Internet Research 25 (June 28, 2023): e41997. http://dx.doi.org/10.2196/41997.

Full text
Abstract:
Background Health policy makers and advocates increasingly utilize online resources for policy-relevant knowledge. Knowledge brokering is one potential mechanism to encourage the use of research evidence in policy making, but the mechanisms of knowledge brokerage in online spaces are understudied. This work looks at knowledge brokerage through the launch of Project ASPEN, an online knowledge portal developed in response to a New Jersey legislative act that established a pilot program for adolescent depression screening for young adults in grades 7-12. Objective This study compares the ability to drive policy brief downloads by policy makers and advocates from the Project ASPEN knowledge portal using a variety of online methods to promote the knowledge portal. Methods The knowledge portal was launched on February 1, 2022, and a Google Ad campaign was run between February 27, 2022, and March 26, 2022. Subsequently, a targeted social media campaign, an email campaign, and tailored research presentations were used to promote the website. Promotional activities ended on May 31, 2022. Website analytics were used to track a variety of actions including new users coming to the website, page views, and policy brief downloads. Statistical analysis was used to assess the efficacy of different approaches. Results The campaign generated 2837 unique user visits to the knowledge portal and 4713 page views. In addition, the campaign generated 6.5 policy web page views/day and 0.7 policy brief downloads/day compared with 1.8 views/day and 0.5 downloads/day in the month following the campaign. The rate of policy brief page view conversions was significantly higher for Google Ads compared with other channels such as email (16.0 vs 5.4; P<.001) and tailored research presentations (16.0 vs 0.8; P<.001). The download conversion rate for Google Ads was significantly higher compared with social media (1.2 vs 0.1; P<.001) and knowledge brokering activities (1.2 vs 0.2; P<.001). By contrast, the download conversion rate for the email campaign was significantly higher than that for social media (1.0 vs 0.1; P<.001) and tailored research presentations (1.0 vs 0.2; P<.001). While Google Ads for this campaign cost an average of US $2.09 per click, the cost per conversion was US $11 per conversion to drive targeted policy web page views and US $147 per conversion to drive policy brief downloads. While other approaches drove less traffic, those approaches were more targeted and cost-effective. Conclusions Four tactics were tested to drive user engagement with policy briefs on the Project ASPEN knowledge portal. Google Ads was shown to be effective in driving a high volume of policy web page views but was ineffective in terms of relative costs. More targeted approaches such as email campaigns and tailored research presentations given to policy makers and advocates to promote the use of research evidence on the knowledge portal website are likely to be more effective when balancing goals and cost-effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
19

Indra Ully Widhi Nugraha, I. P., N. Gunantara, and IGAK Diafari Djuni Hartawan. "ANALISIS PENGUKURAN KUALITAS LAYANAN PADA JARINGAN 4G." Jurnal SPEKTRUM 8, no. 1 (March 27, 2021): 85. http://dx.doi.org/10.24843/spektrum.2021.v08.i01.p10.

Full text
Abstract:
The development of the North Denpasar area, especially the kelurahan and the Peguyanganvillage, has caused many migrants to come and live in the Peguyangan area and have animpact on the development of the population to increase. The population growth of the NorthDenpasar peguyangan region from year to year is growing very rapidly. The analysis methodused in the study "Measuring Service Quality on 4G Networks" with Android-based Drive Testand Application is to analyze the measurement results with standardization or Key PerformanceIndicators (KPI) which are sourced from books, articles, and journals in the field using themeasurement method using G-net Track Pro application to perform Drive Test and measureRSRP, RSRQ, SINR. Meanwhile, the Nperf application is used to measure Download, Upload,and Latency. Based on the results of the measurement of the signal strength in the PeguyanganKelurahan, North Denpasar, it can be concluded, From the experiments conducted from theRSRP, RSRQ, SINR data taken in the morning and evening, in the morning the results obtainedare better than in the afternoon. . The possibility of this is caused by the EU in the morning lessthan in the afternoon. From the experiments conducted from the Download, Upload, SINR datataken in the morning and evening, in the morning the results obtained are better than in theafternoon.
APA, Harvard, Vancouver, ISO, and other styles
20

Otieno, Irene. "Efficiency of Copyright Law in the Digital Space in Kenya." Strathmore Law Review 1, no. 2 (June 1, 2016): 25–44. http://dx.doi.org/10.52907/slr.v1i2.74.

Full text
Abstract:
The emergence and use of new technologies such as Peer-to-Peer (P2P) file sharing has brought with it numerous controversies particularly for intellectual property. P2P technologies function by granting its users access to files stored on another P2P user’s hard drive thus enabling them to download on-demand from users who have granted them such access. This aspect of the P2P networks (making files available for download), has been argued to be a violation of the exclusive rights granted by copyright. Consequently, a new right of making available was introduced via the World Intellectual Property Organisation (WIPO) Copyright Treaty (WCT) to supplement the existing copyright regime thus making it more adaptable to the digital age. The lack of ratification of the WCT and the lack of recognition of this right in Kenya, points to an inefficiency of Kenyan copyright laws to prevent P2P sharing of protected works in Kenya.
APA, Harvard, Vancouver, ISO, and other styles
21

Pratama, Nanta Aprilian, Jannus Marpaung, and Dedy Suryadi. "BIQUAD ANTENNA DESIGN WITH CIRCLE REFLECTORS." Telecommunications, Computers, and Electricals Engineering Journal 1, no. 2 (October 12, 2023): 95. http://dx.doi.org/10.26418/telectrical.v1i2.70022.

Full text
Abstract:
This research is about how to develop a signal receiving antenna using cans as a reflector and copper wire in the form of BiQuad as a drive. With the experimental method directly to the research site which is useful for analyzing each captured signal strength. One of the objectives of this research is to support the improvement of the creative economy in Sungai Kupah Village, where the area really needs help from signal strength. The results of this study indicate that using only a can antenna can improve the GSM signal quality. There are 2 providers used, namely Tri and Telkomsel by taking variable values from Signal Strength, RSSI, SINR, RSRP, RSRQ, Ping, Upload, Download and taking the daily data for 5 research days in the morning and evening which aims to analyze any change in the value of the variable data. The average value obtained by the Tri provider for 5 days in the morning at Signal Strength -113.4 dBm, RSSI -82.64 dBm, SINR 4.78 dB, RSRP -113.4 dBm, RSRQ -13.2 dB , Ping 168.21 ms, Upload 37.68 Mbps, Download 2.08 Mbps. The average value obtained by the Tri provider for 5 days in the afternoon at Signal Strength -112.8 dBm, RSSI -82.36 dBm, SINR 4.56 dB, RSRP -112.8 dBm, RSRQ 13.3 dB, Ping 194.60 ms, Upload 20.52 Mbps, Download 9.15 Mbps. The average Telkomsel provider gets for 5 days in the morning at Signal Strength -115.8 dBm, RSSI -87.16 dBm, SINR 4.56 dB, RSRP -115.8 dBm, RSRQ -10.3 dB, Ping 189.14 ms, Upload 23.52 Mbps, Download 15.67 Mbps. The average Telkomsel provider gets for 5 days in the afternoon at Signal Strength -113.8 dBm, RSSI -86.12 dBm, SINR 6.16 dB, RSRP -113.8 dBm, RSRQ -9.7 dB, Ping 157.52 ms, Upload 31.83 Mbps, Download 22.27 Mbps.
APA, Harvard, Vancouver, ISO, and other styles
22

Solehudin, Arip, Nono Heryana, and Agustia Hananto. "Analysis of Signal Quality, Voice Service, and Data Access on Telkomsel And Indosat Providers in Pakisjaya District." Buana Information Technology and Computer Sciences (BIT and CS) 3, no. 2 (July 31, 2022): 59–62. http://dx.doi.org/10.36805/bit-cs.v3i2.2764.

Full text
Abstract:
Quality in communication is very important in activities in this modern era. It is expected that the expected network quality against network quality is actually not expected. Measurement of network performance is important to refer for users to choose the right operator for service providers to improve the quality of their service Drive Test Method is a method used to measure cellular network performance. The purpose of this study is to study the results of research between service providers. The parameters used in this analysis are Receive Signal Code Power (RSCP), Cell ID, Signal Noise Ratio (SNR), Upload Rate, and Download Rate. This parameter is used for the measurement process of the Drive Test method. While the tool used to collect the value of each Drive Test parameter by using an Android-based application, GNet Track Pro. The measurement results with GNet Track Pro are then processed with the Google Earth application as a measurement area. Research data collected in this analysis were 60 cases, with each village 20 data collected to continue processing with the Drive Test method. In this study, Telkomsel chose to excel in voice services with 150 successful numbers of 150 attempted calls. While Indosat excels in providing data access services and special signals in the village of Tanjungbungin.
APA, Harvard, Vancouver, ISO, and other styles
23

Beny Abukhaer Tatara, Bisma Abdurachman, Desta Lesmana Mustofa, and David Yacobus. "The Potential of Cyber Attacks in Indonesia's Digital Economy Transformation." NUANSA: Jurnal Penelitian Ilmu Sosial dan Keagamaan Islam 20, no. 1 (February 24, 2023): 19–37. http://dx.doi.org/10.19105/nuansa.v20i1.7362.

Full text
Abstract:
In the era of the industrial revolution 4.0, many activities use the internet and computers, including economic activities. Many activities in real space are transformed into cyberspace. Currently, the world economy is transforming from conventional methods to digital. Thus, almost all countries in the world are competing to adapt to these changes, one of which is Indonesia which, based on the McKinsey report, ranks first as the country with the fastest growth in adopting the digital economy. The purpose of writing this article is to analyze the potential for cyber attacks that can affect the transformation of Indonesia's digital economy. The research method used is qualitative with data collection techniques in the form of literature studies. The results of the study found that there are several potential cyber attacks in the transformation of Indonesia's digital economy, including: Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, Man-in-the-middle (MitM) attacks, Phishing attacks, Drive-by-download attack, Password Attack, SQL Injection Attack, Cross-site scripting (XSS) attack, Eavesdropping attack, Birthday Attack, and Malware Attack. (Pada era revolusi industri 4.0, banyak aktivitas yang menggunakan internet dan komputer, termasuk aktivitas ekonomi. Banyak aktivitas di dunia nyata ditransformasikan ke dunia maya. Saat ini, perekonomian dunia sedang berubah dari metode konvensional ke digital. Oleh karena itu, hampir semua negara di dunia sedang bersaing untuk menyesuaikan diri dengan perubahan ini, salah satunya adalah Indonesia yang, berdasarkan laporan McKinsey, menduduki peringkat pertama sebagai negara dengan pertumbuhan tercepat dalam mengadopsi ekonomi digital. Tujuan penulisan artikel ini adalah untuk menganalisis potensi serangan cyber yang dapat mempengaruhi transformasi ekonomi digital Indonesia. Metode penelitian yang digunakan adalah kualitatif dengan teknik pengumpulan data berupa studi pustaka. Hasil penelitian menemukan bahwa ada beberapa potensi serangan cyber dalam transformasi ekonomi digital Indonesia, di antaranya: Serangan Denial-of-service (DoS) dan distributed denial-of-service (DDoS), Serangan Man-in-the-middle (MitM), Serangan Phishing, Serangan Drive-by-download, Serangan Password, Serangan SQL Injection, Serangan Cross-site scripting (XSS), Serangan Eavesdropping, Serangan Birthday, dan Serangan Malware.)
APA, Harvard, Vancouver, ISO, and other styles
24

Alex, Scaria, and Dhiliphan Rajkumar T. "An Approach for Malicious JavaScript Detection Using Adaptive Taylor Harris Hawks Optimization-Based Deep Convolutional Neural Network." International Journal of Distributed Systems and Technologies 13, no. 5 (January 1, 2022): 1–20. http://dx.doi.org/10.4018/ijdst.300354.

Full text
Abstract:
JavaScript has to become a pervasive web technology that facilitates interactive and dynamic Web sites. The extensive usage and the properties permit the authors to simply obfuscate the code and make JavaScript an interesting place for hackers. JavaScript is usually used for adding functionalities and improving the usage of web applications. Despite several merits and usages of JavaScript, the major issue is that several recent cyber-attacks like drive-by-download attacks utilized the susceptibility of JavaScript codes. This paper devises a novel technique for detecting malicious JavaScript. Here, JavaScript codes are fed to the feature extraction phase for extracting the noteworthy features that include execution time, function calls, conditional statements, break statements, and Boolean. The extracted features are further subjected to data transformation wherein log transformation is adapted to normalize the data. Then, feature selection is performed using mutual information.
APA, Harvard, Vancouver, ISO, and other styles
25

Shi, Zheyuan Ryan, Aaron Schlenker, Brian Hay, Daniel Bittleston, Siyu Gao, Emily Peterson, John Trezza, and Fei Fang. "Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 08 (April 3, 2020): 13363–68. http://dx.doi.org/10.1609/aaai.v34i08.7050.

Full text
Abstract:
Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users. One clever technique, the “watering hole” attack, compromises a legitimate website to execute drive-by download attacks by redirecting users to another malicious domain. We introduce a game-theoretic model that captures the salient aspects for an organization protecting itself from a watering hole attack by altering the environment information in web traffic so as to deceive the attackers. Our main contributions are (1) a novel Social Engineering Deception (SED) game model that features a continuous action set for the attacker, (2) an in-depth analysis of the SED model to identify computationally feasible real-world cases, and (3) the CyberTWEAK algorithm which solves for the optimal protection policy. To illustrate the potential use of our framework, we built a browser extension based on our algorithms which is now publicly available online. The CyberTWEAK extension will be vital to the continued development and deployment of countermeasures for social engineering.
APA, Harvard, Vancouver, ISO, and other styles
26

Dong, Longcong, Yuan Shen, Hongying Li, Ruibin Zhang, Shuguang Yu, and Qiaofeng Wu. "Shared Genes of PPARG and NOS2 in Alzheimer’s Disease and Ulcerative Colitis Drive Macrophages and Microglia Polarization: Evidence from Bioinformatics Analysis and Following Validation." International Journal of Molecular Sciences 24, no. 6 (March 15, 2023): 5651. http://dx.doi.org/10.3390/ijms24065651.

Full text
Abstract:
Emerging evidence shows that peripheral systemic inflammation, such as inflammatory bowel disease (IBD), has a close even interaction with central nervous disorders such as Alzheimer’s disease (AD). This study is designed to further clarify the relationship between AD and ulcerative colitis (UC, a subclass of IBD). The GEO database was used to download gene expression profiles for AD (GSE5281) and UC (GSE47908). Bioinformatics analysis included GSEA, KEGG pathway, Gene Ontology (GO), WikiPathways, PPI network, and hub gene identification. After screening the shared genes, qRT-PCR, Western blot, and immunofluorescence were used to verify the reliability of the dataset and further confirm the shared genes. GSEA, KEGG, GO, and WikiPathways suggested that PPARG and NOS2 were identified as shared genes and hub genes by cytoHubba in AD and UC and further validated via qRT-PCR and Western blot. Our work identified PPARG and NOS2 are shared genes of AD and UC. They drive macrophages and microglia heterogeneous polarization, which may be potential targets for treating neural dysfunction induced by systemic inflammation and vice versa.
APA, Harvard, Vancouver, ISO, and other styles
27

Błaszczak-Bąk, Wioleta, and Anna Sobieraj-Żłobińska. "Standard deviation as the optimization criterion in the OptD method and its influence on the generated DTM." E3S Web of Conferences 63 (2018): 00011. http://dx.doi.org/10.1051/e3sconf/20186300011.

Full text
Abstract:
Reduction of the measurement dataset is one of the current issues related to constantly developing technologies that provide large datasets, e.g. laser scanning. It could seems that presence and evolution of processors computer, increase of hard drive capacity etc. is the solution for development of such large datasets. And in fact it is, however, the “lighter” datasets are easier to work with. Additionally, reduced datasets can be exchange/transfer/download faster via internet or cloud stored. Therefore the issue of data reduction algorithms/methods is continuously relevant. In this paper authors presented the results of the study whether the standard deviation of measurement data can be used as optimization criterion in the process of dataset reduction conducted by means of the OptD method. The OptD is based on the cartographic generalization methods. In iterative process irrelevant points are being removed and those that characteristic are being preserved, what in results means more points in complex fragments of scanned object/surface and less in flat/uncomplicated area. Obtained reduced datasets were then the basis for DTMs generation. For DTMs assessment RMSE was calculated.
APA, Harvard, Vancouver, ISO, and other styles
28

Song, Xuyan, Chen Chen, Baojiang Cui, and Junsong Fu. "Malicious JavaScript Detection Based on Bidirectional LSTM Model." Applied Sciences 10, no. 10 (May 16, 2020): 3440. http://dx.doi.org/10.3390/app10103440.

Full text
Abstract:
JavaScript has been widely used on the Internet because of its powerful features, and almost all the websites use it to provide dynamic functions. However, these dynamic natures also carry potential risks. The authors of the malicious scripts started using JavaScript to launch various attacks, such as Cross-Site Scripting (XSS), Cross-site Request Forgery (CSRF), and drive-by download attack. Traditional malicious script detection relies on expert knowledge, but even for experts, this is an error-prone task. To solve this problem, many learning-based methods for malicious JavaScript detection are being explored. In this paper, we propose a novel deep learning-based method for malicious JavaScript detection. In order to extract semantic information from JavaScript programs, we construct the Program Dependency Graph (PDG) and generate semantic slices, which preserve rich semantic information and are easy to transform into vectors. Then, a malicious JavaScript detection model based on the Bidirectional Long Short-Term Memory (BLSTM) neural network is proposed. Experimental results show that, in comparison with the other five methods, our model achieved the best performance, with an accuracy of 97.71% and an F1-score of 98.29%.
APA, Harvard, Vancouver, ISO, and other styles
29

Visconti, Paolo, Marzia Luceri, Ramiro Velazquez, and De Fazio Roberto. "A remote-controlled global navigation satellite system based rover for accurate video-assisted cadastral surveys." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (August 1, 2022): 3551. http://dx.doi.org/10.11591/ijece.v12i4.pp3551-3563.

Full text
Abstract:
<span>One of the main tasks of a cadastral surveyor is to accurately determine property boundaries by measuring control points and calculating their coordinates. This paper proposes the development of a remotely-controlled tracking system to perform cadastral measurements. A Bluetooth-controlled rover was developed, including a Raspberry Pi Zero W module that acquires position data from a VBOX 3iSR global navigation satellite system (GNSS) receiver, equipped with a specific modem to download real-time kinematic (RTK) corrections from the internet. Besides, the Raspberry board measures the rover speed with a hall sensor mounted on a track, adjusting the acquisition rate to collect data at a fixed distance. Position and inertial data are shared with a cloud platform, enabling their remote monitoring and storing. Besides, the power supply section was designed to power the different components included in the acquisition section, ensuring 2 hours of energy autonomy. Finally, a mobile application was developed to drive the rover and real-time monitor the travelled path. The tests indicated a good agreement between rover measurements and those obtained by a Trimble R10 GNSS receiver (+0.25% mean error) and proved the superiority of the presented system over a traditional metric wheel.</span>
APA, Harvard, Vancouver, ISO, and other styles
30

Maisaroh, Sri. "Pengalaman Siswa Mengikuti PJJ Menggunakan Google Classroom Selama Pandemi Covid-19." Reslaj : Religion Education Social Laa Roiba Journal 4, no. 6 (May 11, 2022): 1701–9. http://dx.doi.org/10.47467/reslaj.v4i6.1429.

Full text
Abstract:
Distance Learning (PJJ) is the best solution to suppress or break the chain of transmission of the covid 19 virus. PJJ itself must be supported by an application that can be used on a cellphone or laptop. One application that is easily accessible and free is Google Classroom (GC). Google Classroom is a learning application issued by Google in learning. Ease of access via computers and mobile phones, is very beneficial for teachers and students. The purpose of this study was to gain an understanding of information about the experiences of students participating in PJJ using google classroom during the covid-19 pandemic. This study used a qualitative approach with the phenomenological method. Data retrieval using online interviews with two class XII students of Refrigeration and Administration Engineering (TPTU), consisting of one student in first rank and the second being the last ranked student in his class. Researchers found strengths and weaknesses in using the Google Classroom application. The strength of Google Classroom is that it is free, the application is easy to download on any device and has features to support learning. The weakness is that the capacity of the class maker in this case the teacher must be large because student assignments are directly stored on the drive and the interaction between teachers/students only uses writing. Keywords: Covid-19, Google Classroom, Distance Learning (PJJ)
APA, Harvard, Vancouver, ISO, and other styles
31

Misra, Shobha, and Viren Kariya. "Online Pivot to Support Students' Learning Amid COVID-19." Healthline 12, no. 2 (September 7, 2021): 58–59. http://dx.doi.org/10.51957/healthline_224_2021.

Full text
Abstract:
What problem was addressed? Amid Covid-19 colleges and universities are closed down, reorganization of student education raises concerns about timely graduation. [1] Therefore, there is a radical shift across colleges to remote and online teaching models. The current article shares an experience with online teaching at a Medical College located in western India. What was tried? During Covid-19 lockdown it was decided by faculty of first professional medical course of the medical college, viz; Anatomy, Physiology & Biochemistry to shift to teaching online for a batch of 200 students. Initially, videoconferencing (VC) call applications like zoom or Team Link were utilized and WhatsApp group was created to inform students regarding topics and time. This ran smoothly to start with and 160-170 participants could join. Within few days, internet connectivity and bandwidth issues started erupting from both the sides, hampering quality of teaching. The teachers then decided to record each session via screen recording software and started uploading the same in dedicated Google Drive, sharing the link via WhatsApp group. Additionally, a dedicated YouTube channel was created for students to download videos to watch as per their convenience. This helped to minimize the challenge faced due to internet connectivity and to safeguard against cyber-attack, likely to prop up with apps like Zoom that uses VC.
APA, Harvard, Vancouver, ISO, and other styles
32

Finner, Kyle, Bomee Lee, Ranga-Ram Chary, M. James Jee, Christopher Hirata, Giuseppe Congedo, Peter Taylor, and Kim HyeongHan. "Near-IR Weak-lensing (NIRWL) Measurements in the CANDELS Fields. I. Point-spread Function Modeling and Systematics." Astrophysical Journal 958, no. 1 (November 1, 2023): 33. http://dx.doi.org/10.3847/1538-4357/acfafd.

Full text
Abstract:
Abstract We have undertaken a near-IR weak-lensing (NIRWL) analysis of the CANDELS HST/WFC3-IR F160W observations. With the Gaia proper motion–corrected catalog as an astrometric reference, we updated the astrometry of the five CANDELS mosaics and achieved an absolute alignment within 0.″02 ± 0.″02, on average, which is a factor of several superior to existing mosaics. These mosaics are available to download (https://drive.google.com/drive/folders/1k9WEV3tBOuRKBlcaTJ0-wTZnUCisS__r). We investigated the systematic effects that need to be corrected for weak-lensing measurements. We find that the largest contributing systematic effect is caused by undersampling. We find a subpixel centroid dependence on the PSF shape that causes the PSF ellipticity and size to vary by up to 0.02% and 3%, respectively. Using the UDS as an example field, we show that undersampling induces a multiplicative shear bias of −0.025. We find that the brighter-fatter effect causes a 2% increase in the size of the PSF and discover a brighter-rounder effect that changes the ellipticity by 0.006. Based on the small range of slopes in a galaxy’s spectral energy distribution (SED) within the WFC3-IR bandpasses, we suggest that the impact of the galaxy SED on the PSF is minor. Finally, we model the PSF of WFC3-IR F160W for weak lensing using a principal component analysis. The PSF models account for temporal and spatial variations of the PSF. The PSF corrections result in residual ellipticities and sizes, ∣de 1∣ < 0.0005 ± 0.0003, ∣de 2∣ < 0.0005 ± 0.0003, and ∣dR∣ < 0.0005 ± 0.0001, that are sufficient for the upcoming NIRWL search for massive overdensities in the five CANDELS fields.
APA, Harvard, Vancouver, ISO, and other styles
33

Mahmoudi, Chokri, Flah Aymen, and Sbita Lassaad. "Smart database concept for Power Management in an electrical vehicle." International Journal of Power Electronics and Drive Systems (IJPEDS) 10, no. 1 (March 1, 2019): 160. http://dx.doi.org/10.11591/ijpeds.v10.i1.pp160-169.

Full text
Abstract:
<p>As world population continues to grow and the limited amount of fossil fuels begin to diminish, it may not be possible to afford the needed amount of energy demanded by the world by only using fossil fuels. Meanwhile, the abundant nature of renewable energy sources brings new beginning for next generations. Greater penetration of electric vehicles will play an important role in building green and healthy world. The main remaining issue to make the switch from conventional to electric vehicle is performance cost; Efficient EVs that can drive for long distances, on single charge, are still expensive for ordinary consumer. To address this range problem, many attempts have been made during last decade. The goal was to conceive a power efficient electric vehicle, capable of managing its energy and reach longer distances. It depends on the electrical architectures and used algorithms.</p><p>This paper adds new perspective for power Management in EVs; The proposed methodology introduces a new power management architecture based on communication and car learning. The conventional software level in EV has been replaced with self readjustable software. EVs are connected through a database, and can upload or download adjustment parameters while software is running.</p><p>To take advantage of the new architecture, a new learning technique concept is introduced too, based on Cloud experience exchange between Electric Vehicles. This enhancement aims to build a better EV experience in power management through Cloud sharing and definitely cut with conventional architecture that may have reached its boundaries.</p>
APA, Harvard, Vancouver, ISO, and other styles
34

Bespalov, A. L., I. G. Svidrak, and O. O. Boiko. "Increase the functionality of vibration feeders with electromagnetic vibration." Scientific Messenger of LNU of Veterinary Medicine and Biotechnologies 23, no. 95 (April 9, 2021): 33–37. http://dx.doi.org/10.32718/nvlvet-f9506.

Full text
Abstract:
Under modern conditions vibrating hopper feeders with electromagnetic drive are irreplaceable when it comes to production processes in mechanical engineering and instrument making optimization processes. They are used to download small, medium or miniature details to automated technological equipment, such as automatic machines, automatic lines and automated complexes, or any other flexible automated production. The vibrating hopper loading devices are most commonly used in transportation and loading of details on working positions of assembly automatic machines and assembly automated complexes. In this case the details must be issued in a clearly oriented state. For this purpose, the stationary automated orienting devices, or the orienting devices located directly on the working vibrating feeders` bodies are used. Low compressed air pressure is often used in these devices. Apart from this, in some cases the low compressed air pressure is used in vibrating feeders to increase the maximum lifting angle when vibrating transportation of details on a transport tray of the feeder. We already know the designs of vibrating feeders, whose transport tray is equipped with channels and openings for the supply of compressed air, whose jets affect the parts that are transported in order to increase the maximum possible lifting angle or the speed of parts transportation, as well as to ensure the guaranteed gap between them at the download position. We also know the vibrating feeders` constructions equipped with jet pneumatic devices, which are set exactly on the vibrating feeder hopper and serve for non-contact orientation of details that are issued. All of these devices use the low compressed air supplied by means of the flexible pipeline from a workshop pneumatic network. But the fact that such network is simply absent in many enterprises` workshops makes it impossible to use the vibrating feeders like these, this way decreasing their use. For expanding their use it is necessary to have vibrating feeders with individual low pressure compressed air source. Modern production manufactures new models of machines with high technical economic indicators, so functionality increase of the existing one equipment and the development of new schemes of machines is an important task for designers and technological equipment manufacturers, because minimal improvement of its technological and performance can lead to a significant economic effect. The set of elements affecting the performance and efficiency of vibrating bunker feeders with electromagnetic drives that have a directional elastic system are presented in this paper. The additional structural elements increasing the functionality of such feeders are offered.
APA, Harvard, Vancouver, ISO, and other styles
35

Bariyah, Siti Husnul, Kuntum An Nisa Imania, and Yuniar Purwanti. "Prototype Aplikasi Pembelajaran Daring Di Masa Pandemi Covid-19 Berbasis Cloud Storage." JURNAL PETIK 6, no. 2 (September 30, 2020): 81–85. http://dx.doi.org/10.31980/jpetik.v6i2.867.

Full text
Abstract:
Abstract - The Covid-19 pandemic that has been running for several months from April 2020 to September 2020 has caused adjustments in various fields, one of which is the field of education. Based on Circular No. 4 of 2020 concerning the implementation of education in the Covid-19 emergency period, one of the points is that the learning process is carried out from home, thus requiring the school to make a new innovation for the learning process because it does not allow face-to-face classrooms. The school and teachers make an agreement on how the method they will use. This research takes the example of a case in a private school in Bandung regency that implements online learning media through group wa found some of the deficiencies are for teachers there is no neat learning history because of its nature that continues to accumulate when there is an incoming message, for parents there is limited storage memory. which causes many obstacles in accessing the WA group to download teaching materials from the teacher or sending reports on the results of daily learning. Therefore researchers intend to develop a cloud storage-based online learning application prototype by utilizing a variety of technologies including Laravel programming language, react native (mobile ), Firebase for the use of its database and the Google Drive API for file cloud storage. The result of developing this prototype is in the form of a system design consisting of activity diagrams, use case diagrams, class diagrams and mobile-based interface designKeywords — Application, learning, online, cloud, storage Abstrak — Pandemic covid-19 yang telah berjalan beberapa bulan terhitung dari April 2020 sampai sekarang September 2020 telah menyebabkan penyesuaian di berbagai macam bidang salah satu diantaranya adalah bidang Pendidikan. Berdasarkan Surat Edaran No 4 Tahun 2020 tentang pelaksanaan Pendidikan dalam masa darurat covid-19, salah satu point nya adalah proses belajar dilaksanakan dari rumah, sehingga menuntut pihak sekolah untuk membuat sebuah inovasi baru untuk proses pembelajaran karena tidak memungkinkan untuk adanya tatap muka dikelas. Pihak sekolah dan guru membuat sebuah kesepakatan bersama bagaimana metode yang akan mereka gunakan. Penelitian ini mengambil contoh kasus di sebuah sekolah swasta di kab bandung yang menerapkan media pembelajaran daring memalui wa grup ditemukan beberapa kekurangan diantaranya adalah bagi guru tidak adanya histori pembelajaran yang rapih karena sifatnya yang terus menumpuk ketika ada pesan masuk, bagi orang tua adanya keterbatasan memori penyimpanan yang menyebabkan banyak kendala dalam mengakses WA grup untuk mengunduh bahan ajar dari guru atau mengirimkan laporan hasil pembelajaran harian.Oleh karena itu peneliti bermaksud untuk mengembangkan sebuah prototype aplikasi pembelajaran daring berbasis cloud storage dengan memanfaatkan berbagai macam teknologi diantaranya Bahasa pemrograman Laravel, react native (mobile), firebase untuk penggunaan database nya dan google drive API untuk file cloud storage. Hasil dari pengembangan prototype ini adalah berupa perancangan system yang terdiri dari activity diagram, use case diagram, class diagram dan desain antarmuka berbasis mobile.Kata Kunci— aplikasi, pembelajaran, daring, cloud, strorage
APA, Harvard, Vancouver, ISO, and other styles
36

Chen, Junying, Fu Zhu, Mou Liu, Zhen Meng, Lin Xu, and Lin Xu. "A method to improve tracking ability of drive control of MEMS gyroscopes." Sensor Review 41, no. 2 (February 26, 2021): 153–61. http://dx.doi.org/10.1108/sr-09-2019-0222.

Full text
Abstract:
Purpose A high-precision gyroscope is an important tool for accurate positioning, and the amplitude stability and frequency tracking ability of the drive control system are important and necessary conditions to ensure the precision of micro-electro-mechanical systems (MEMS) gyroscopes. To improve the precision of MEMS gyroscopes, this paper proposes a method to improve the amplitude stability and frequency tracking ability of a drive control system. Design/methodology/approach A frequency tracking loop and an amplitude control loop are proposed to improve the frequency tracking ability and amplitude stability of the drive control system for a MEMS gyroscopes. The frequency tracking loop mainly includes a phase detector, a frequency detector and a loop filter. And, the amplitude control loop mainly includes an amplitude detector, a low-pass filter and an amplitude control module. The simulation studies on the frequency tracking loop, amplitude control loop and drive control system composed of these two loops are implemented. The corresponding digital drive control algorithm is realized by the Verilog hardware description language, which is downloaded to the application-specific integrated circuits (ASIC) platform to verify the performances of the proposed method. Findings The simulation experiments in Matlab/Simulink and tests on the ASIC platform verify that the designed drive control system can keep the amplitude stable and track the driving frequency in real time with high precision. Originality/value This study shows a way to design and realize a drive control system for MEMS gyroscopes to improve their tracking ability. It is helpful for improving the precision of MEMS gyroscopes.
APA, Harvard, Vancouver, ISO, and other styles
37

Kung, Ying-Shieh, Seng-Chi Chen, Jin-Mu Lin, and Tsung-Chun Tseng. "FPGA-realization of a speed control IC for induction motor drive." Engineering Computations 33, no. 6 (August 1, 2016): 1835–52. http://dx.doi.org/10.1108/ec-08-2015-0260.

Full text
Abstract:
Purpose – The purpose of this paper is to integrate the function of a speed controller for induction motor (IM) drive, such as the speed PI controller, the current vector controller, the slip speed estimator, the space vector pulse width modulation scheme, the quadrature encoder pulse, and analog to digital converter interface circuit, etc. into one field programmable gate array (FPGA). Design/methodology/approach – First, the mathematical modeling of an IM drive, the field-oriented control algorithm, and PI controller are derived. Second, the very high speed IC hardware description language (VHDL) is adopted to describe the behavior of the algorithms above. Third, based on electronic design automation simulator link, a co-simulation work constructed by ModelSim and Simulink is applied to verify the proposed VHDL code for the speed controller intellectual properties (IP). Finally, the developed VHDL code will be downloaded to the FPGA for further control the IM drive. Findings – In realization aspect, it only needs 5,590 LEs, 196,608 RAM bits, and 14 embedded 9-bit multipliers in FPGA to build up a speed control IP. In computational power aspect, the operation time to complete the computation of the PI controller, the slip speed estimator, the current vector controller are only 0.28 μs, 0.72 μs, and 0.96 μs, respectively. Practical implications – Fast computation in FPGA can speed up the speed response of IM drive system to increase the running performance. Originality/value – This is the first time to realize all the function of a speed controller for IM drive within one FPGA.
APA, Harvard, Vancouver, ISO, and other styles
38

Lu, Yuan, Fei Teng Liu, and Xiaoou Song. "The Generation of Three-Phase SPWM Wave Based on FPGA." Applied Mechanics and Materials 401-403 (September 2013): 535–38. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.535.

Full text
Abstract:
This paper presents a method of generating the three-phase SPWM wave based on FPGA. In a three-phase PV inverters or other using DC to converte into a three-phase AC system,it can be used as six IGBT gate drive signals of a three-phase inverter bridge.This article analysed the principle of the three-phase inverter circuit , obtaining the waveform of the three-phase SPWM wave. The 60 SPWM wave of each sine wave at 50Hz,it designs the hardware circuit to generate the waveform. Hardware circuit of hardware programming language makes the simulation of the three-phase drive waveform in Quartus II,and the program is downloaded into FPGA chip Cyclone II EP2C8Q208N to get waveform output. This design uses a counter method, checking ROM table to determine the preset value of the counter, and the output pulse width control can be achieved by changing the size of the preset value. We designes a three-phase adjustable power using this method and achieved the intended purpose.
APA, Harvard, Vancouver, ISO, and other styles
39

Yin, Fengyuan, Xiaoming Yuan, Zhiao Ma, and Xinyu Xu. "Vector Control of PMSM Using TD3 Reinforcement Learning Algorithm." Algorithms 16, no. 9 (August 24, 2023): 404. http://dx.doi.org/10.3390/a16090404.

Full text
Abstract:
Permanent magnet synchronous motor (PMSM) drive systems are commonly utilized in mobile electric drive systems due to their high efficiency, high power density, and low maintenance cost. To reduce the tracking error of the permanent magnet synchronous motor, a reinforcement learning (RL) control algorithm based on double delay deterministic gradient algorithm (TD3) is proposed. The physical modeling of PMSM is carried out in Simulink, and the current controller controlling id-axis and iq-axis in the current loop is replaced by a reinforcement learning controller. The optimal control network parameters were obtained through simulation learning, and DDPG, BP, and LQG algorithms were simulated and compared under the same conditions. In the experiment part, the trained RL network was compiled into C code according to the workflow with the help of rapid prototyping control, and then downloaded to the controller for testing. The measured output signal is consistent with the simulation results, which shows that the algorithm can significantly reduce the tracking error under the variable speed of the motor, making the system have a fast response.
APA, Harvard, Vancouver, ISO, and other styles
40

Bux, Khuda, Muhammad Yousaf, Akhtar Hussain Jalbani, and Komal Batool. "Detection of Malicious Servers for Preventing Client-Side Attacks." January 2021 40, no. 1 (January 1, 2021): 230–40. http://dx.doi.org/10.22581/muet1982.2101.20.

Full text
Abstract:
The number of client-side attacks is increasing day-by-day. These attacks are launched by using various methods like phishing, drive-by downloads, click-frauds, social engineering, scareware, and ransomware. To get more advantage with less exertion and time, the attackers are focus on the clients, rather than servers which are more secured as compared to the clients. This makes clients as an easy target for the attackers on the Internet. A number of systems/tools have been created by the security community with various functions for detection of client-side attacks. The discovery of malicious servers that launch the client side attacks can be characterized in two types. First to detect malicious servers with passive detection which is often signature based. Second to detect the malicious servers with active detection often with dynamic malware analysis. Current systems or tools have more focus on identifying malicious servers rather than preventing the clients from those malicious servers. In this paper, we have proposed a solution for the detection and prevention of malicious servers that use the Bro Intrusion Detection System (IDS) and VirusTotal API 2.0. The detected malicious link is then blocked at the gateway.
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Xue Wen, Zhou Hu Deng, Xiao Yun, Long Zhang, and Yuan Zhang. "The Control System Design of AC Servo PMSM Based on an EMCU." Applied Mechanics and Materials 380-384 (August 2013): 309–12. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.309.

Full text
Abstract:
The mathematical vector model of a permanent magnet synchronous motor (PMSM) has first been discussed in this paper, and a servo control system based on Space Vector Pulse Width Modulation (SVPWM) has been designed, in which a enhanced Microprogrammed Control Unit (EMCU) is combined with drive chips and the relevant control software to achieve the precise control of PMSM. In order to control the position, speed and current of the PMSM, six SVPWM signals are generated with the motor vector control method, and the vector control strategy with three closed loops is projected. According to the control principle, the circuits of the hardware modules are designed and built, and the program of the control process is compiled and downloaded the EMCU, and then the human-computer interaction interface of the system is implemented by LabVIEW. The results of the test show that the control system designed can control the rotating speed and the high-speed pendulum operation of PMSM precisely.
APA, Harvard, Vancouver, ISO, and other styles
42

Hou, Tianjun, Bernard Yannou, Yann Leroy, and Emilie Poirson. "An Affordance-Based Online Review Analysis Framework." Proceedings of the Design Society: International Conference on Engineering Design 1, no. 1 (July 2019): 2457–66. http://dx.doi.org/10.1017/dsi.2019.252.

Full text
Abstract:
AbstractOne of the main tasks of today's data-driven design is to learn customers' concerns from the feedback data posted on the internet, to drive smarter and more profitable decisions during product development. Feature-based opinion mining was first performed by the computer and design scientists to analyse online product reviews. In order to provide more sophisticated customer feedback analyses and to understand in a deeper way customer concerns about products, the authors propose an affordance-based online review analysis framework. This framework allows understanding how and in what condition customers use their products, how user preferences change over years and how customers use the product innovatively. An empirical case study using the proposed approach is conducted with the online reviews of Kindle e-readers downloaded from amazon.com. A set of innovation leads and redesign paths are provided for the design of next-generation e-reader. This study suggests that bridging data analytics with classical models and methods in design engineering can bring success for data-driven design.
APA, Harvard, Vancouver, ISO, and other styles
43

Rai, Ankush, and Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.

Full text
Abstract:
Network and system security of cyber physical system is of vital significance in the present information correspondence environment. Hackers and network intruders can make numerous fruitful endeavors to bring crashing of the networks and web services by unapproved interruption. Computing systems connected to the Internet are stood up to with a plenty of security threats, running from exemplary computer worms to impart drive by downloads and bot networks. In the most recent years these threats have achieved another nature of automation and sophistication, rendering most defenses inadequate. Ordinary security measures that depend on the manual investigation of security incidents and attack advancement intrinsically neglect to give an assurance from these threats. As an outcome, computer systems regularly stay unprotected over longer time frames. This study presents a network intrusion detection based on machine learning as a perfect match for this issue, as learning strategies give the capacity to naturally dissect data and backing early detection of threats. The results from the study have created practical results so far and there is eminent wariness in the community about learning based defenses. Machine learning based Intrusion Detection and Network Security Systems are one of these solutions. It dissects and predicts the practices of clients, and after that these practices will be viewed as an attack or a typical conduct.
APA, Harvard, Vancouver, ISO, and other styles
44

Choo, Wou Onn, Lam Hong Lee, Yen Pei Tay, Khang Wen Goh, Dino Isa, and Suliman Mohamed Fati. "Automatic Folder Allocation System for Electronic Text Document Repositories Using Enhanced Bayesian Classification Approach." International Journal of Intelligent Information Technologies 15, no. 2 (April 2019): 1–19. http://dx.doi.org/10.4018/ijiit.2019040101.

Full text
Abstract:
This article proposes a system equipped with the enhanced Bayesian classification techniques to automatically assign folders to store electronic text documents. Despite computer technology advancements in the information age where electronic text files are so pervasive in information exchange, almost every single document created or downloaded from the Internet requires manual classification by the users before being deposited into a folder in a computer. Not only does such a tedious task cause inconvenience to users, the time taken to repeatedly classify and allocate a folder for each text document impedes productivity, especially when dealing with a huge number of files and deep layers of folders. In order to overcome this, a prototype system is built to evaluate the performance of the enhanced Bayesian text classifier for automatic folder allocation, by categorizing text documents based on the existing types of text documents and folders present in user's hard drive. In this article, the authors deploy a High Relevance Keyword Extraction (HRKE) technique and an Automatic Computed Document Dependent (ACDD) Weighting Factor technique to a Bayesian classifier in order to obtain better classification accuracy, while maintaining the low training cost and simple classifying processes using the conventional Bayesian approach.
APA, Harvard, Vancouver, ISO, and other styles
45

Muhammad Agus Futuhul Ma'wa, Ayu Safitri, Fatima Az-Zahra Wairooy, and Mindo Mursalina Jen. "Peran Zakat Dalam Membina Ekonomi Berkelanjutan: Sebuah Analisis Bibliometrik." Jurnal Magister Ekonomi Syariah 2, no. 2 Desember (January 20, 2024): 105–18. http://dx.doi.org/10.14421/jmes.2023.022-07.

Full text
Abstract:
The problems that hit the global community raise concern. Classical problems such as poverty, hunger, and access to education are other complicated issues that drive leaders to express their commitment to transforming the world through sustainable development goals. Zakat refers to the social responsibility of the Muslim community toward the universal humanitarian mission and the natural environment as a concern of global leaders. The main goal of bibliometric research is to analyze and measure patterns of scientific publications, the distribution of literature, and the development of research. The article data indexed by Scopus and downloaded is the year of publication, the author's name and affiliates, keywords, and geographical distribution. Based on the Scopus database of 23 documents related to the prospects of Zakat in a Sustainable Economy published in the period 2014-2023 and data analyzed using VOSviewer software, The growth trend of the highest Scopus-indexed Sustainable Economy publication reached 5 publications in 2022 and 2023. This research contributes to the literature related to this theme as well as researchers interested in exploring this field. The research results show that there are still very few publications in this field, so researchers are exploring this theme further.
APA, Harvard, Vancouver, ISO, and other styles
46

Tappen, Ruth, Jinwoo Jang, Sonia Moshfeghi, KwangSoo Yang, Monica Rosselli, Joshua Coniff, Borko Furht, and David Newman. "IN-VEHICLE SENSORS TO DETECT CHANGES IN DRIVING BEHAVIORS WITH EMERGENCE OF MCI." Innovation in Aging 7, Supplement_1 (December 1, 2023): 645. http://dx.doi.org/10.1093/geroni/igad104.2099.

Full text
Abstract:
Abstract Driving is a complex behavior requiring attention, judgment, orientation, memory, processing speed, visual acuity, adequate limb strength, and other functional abilities. It has been suggested that a change in driving behavior may be an early indicator of cognitive decline in the aging brain. The literature suggests that older drivers will drive less and more slowly as their cognitive skills begin to decline. In the “In-Vehicle Sensors to Detect Cognitive Change in Older Drivers” study, sensors are installed in participant vehicles and data is downloaded every three months at which time a carefully curated battery of cognitive tests is also administered. Records of those suggesting mild cognitive impairment (MCI) are reviewed by a Consensus Diagnostic Panel for confirmation. In the first 100 participants who have been followed over a year, nine participants evidenced existing or emerging MCI. Of these, six have experienced a decline in cognition in the last year. A comparison of driving behaviors over the year evidenced the previously reported slower, less frequent driving but also a previously unreported increase in hard braking and hard turns. The uniqueness of our longitudinal study is the continuous tracking of vehicle acceleration patterns over time, revealing significant relationships between g-force acceleration and cognition.
APA, Harvard, Vancouver, ISO, and other styles
47

Schwarz, Lara, Anna Dimitrova, Rosana Aguilera, Rupa Basu, Alexander Gershunov, and Tarik Benmarhnia. "Smoke and COVID-19 case fatality ratios during California wildfires." Environmental Research Letters 17, no. 1 (January 1, 2022): 014054. http://dx.doi.org/10.1088/1748-9326/ac4538.

Full text
Abstract:
Abstract Recent evidence has shown an association between wildfire smoke and COVID-19 cases and deaths. The San Francisco Bay Area, in California (USA), experienced two major concurrent public health threats in 2020: the COVID-19 pandemic and dense smoke emitted by wildfires. This provides a unprecedented context to unravel the role of acute air pollution exposure on COVID-19 severity. A smoke product provided by the National Oceanic and Atmospheric Association Hazard Mapping System was used to identify counties exposed to heavy smoke in summer and fall of 2020. Daily COVID-19 cases and deaths for the United States were downloaded at the County-level from the CDC COVID Data Tracker. Synthetic control methods were used to estimate the causal effect of the wildfire smoke on daily COVID-19 case fatality ratios (CFRs), adjusting for population mobility. Evidence of an impact of wildfire smoke on COVID-19 CFRs was observed, with precise estimates in Alameda and San Francisco. Up to 58 (95% CI: 29, 87) additional deaths for every 1000 COVID-19 incident daily cases attributable to wildfire smoke was estimated in Alameda in early September. Findings indicated that extreme weather events such as wildfires smoke can drive increased vulnerability to infectious diseases, highlighting the need to further study these colliding crises. Understanding the environmental drivers of COVID-19 mortality can be used to protect vulnerable populations from these potentially concomitant public health threats.
APA, Harvard, Vancouver, ISO, and other styles
48

Provvidenza, Christine, Shauna Kingsnorth, Jennifer Dawson, Andree-Anne Ledoux, Roger Zemek, and Nick Reed. "Applying knowledge translation frameworks, approaches and principles to co-create a dissemination plan: Optimizing the spread of a pediatric concussion guideline." Journal of Concussion 6 (January 2022): 205970022211162. http://dx.doi.org/10.1177/20597002221116239.

Full text
Abstract:
Background Clinical practice guidelines are evidence-based statements that assist healthcare professionals with improving patient care. Achieving guideline aims depends on successful knowledge translation (KT) and includes dissemination and implementation efforts. Dissemination efforts are important precursors to implementation, help to maximize awareness and reach of best practices, and prepare for evidence adoption. This article shares the application of KT frameworks, approaches and principles in the creation of a dissemination plan and KT products for the Living Guideline for Pediatric Concussion Care. The target audience for dissemination are healthcare professionals delivering clinical care to patients between 5–18 years. Methods Guided by the Framework for Knowledge Transfer and an integrated KT (iKT) approach, 46 concussion experts participated in an iKT workshop and knowledge board activity to: 1) establish a Living Guideline dissemination plan; 2) identify products to share the Living Guideline; and, 3) prepare for Living Guideline implementation planning. Post-workshop, a snowball approach invited knowledge users including educators and youth/young adults with lived experience in concussion via interviews and focus groups, to expand upon the dissemination plan and recommended products. Results The dissemination plan yielded a reach of nearly 42,000 Living Guideline page views from September, 2019-January, 2022. Dissemination efforts included 13 multi-media interviews, over 40 activities (e.g. webinars), and 28 engagement emails to help raise awareness. Eight KT products were developed to foster sharing and use of the Living Guideline, with over 3000 downloads across all KT products. Conclusions Applying an iKT approach alongside appropriate frameworks and principles allowed for interaction and partnership building, resulting in the development of a robust dissemination plan and essential KT products. By showing the breadth and impact of the KT activities undertaken, it is hoped that the concussion community will explore how KT practices can bolster efforts to drive evidence into practice and optimize concussion care.
APA, Harvard, Vancouver, ISO, and other styles
49

Bah, Mohamed Pateh, Ezekiel K. Duramany-Lakkoh, and Ernest Udeh. "Assessing the Effect of Human Resource Information Systems on the Human Resource Strategies of Commercial Banks." European Journal of Business and Management Research 7, no. 3 (June 20, 2022): 304–12. http://dx.doi.org/10.24018/ejbmr.2022.7.3.1460.

Full text
Abstract:
The purpose of the study is to analyze the impact that Human Resource Information Systems on Human Resource Management Strategies. The statement of the problem was to look if human resource information systems have fulfilled their promise of providing timely, better, cost-efficient, etc. information for strategic decision making by human resource management practitioners by looking at its influences on the human resource management strategies. The Non-Probability Sampling technique was used to collect the data because non-probability sampling is often associated with case study research design and qualitative research. Because the total sample will have the same distribution of features as the entire population and the respondent are chosen on the basis of predetermined features, the Quota Sampling under the Non-probability sampling technique was used. Questionnaires were sent to ten (10) commercial banks in Sierra Leone. The data was collected using Google Forms and uploaded to SPSS from an Excel sheet downloaded from Google Drive. SPSS was therefore used to do the analysis of the responses from the questionnaire. Based on the analysis, the researchers concluded that HRIS has indeed fulfilled its promise to timely, better, cost-effective information for the strategic decision-making by human resource managers with respect to the Human Resource Management Strategies. It, therefore, has a positive impact on human resource management strategies. The research recommends that HRIS be used but more training needs to be given to staff, the system must be updated regularly for security updates and more needs to be done to ensure that the cost of maintaining the system is reduced.
APA, Harvard, Vancouver, ISO, and other styles
50

Dong, Yue, and Sen Tian. "A large database towards user-friendly SSVEP-based BCI." Brain Science Advances 9, no. 4 (December 2023): 297–309. http://dx.doi.org/10.26599/bsa.2023.9050020.

Full text
Abstract:
Background: Brain-computer interfaces (BCIs) have gained considerable attention for their potential in assisting individuals who have motor impairments with communication and rehabilitation. Among BCIs, steady-state visual evoked potential (SSVEP)-based systems have demonstrated high efficiency in interactive applications. However, ergonomic design challenges have limited their practical implementation in industrial settings. Issues such as visual and mental fatigue caused by flickering stimuli and the time-consuming preparation process hinder user adoption of such systems. Methods: To evaluate these BCI solutions, we introduced an open database comprising Electroencephalogram (EEG) data collected from 59 healthy volunteers using ergonomically designed semi-dry electrodes and grid stimuli. The database was acquired without electromagnetic shielding, and the preparation time for each participant was <5 min. A 40-target SSVEP speller system with cues was used in the experiment. Results: We validate the database by temporal and spectral analyzing methods. To further investigate the database, filter bank canonical correlation analysis (FBCCA), ensemble task-related component analysis (e-TRCA) and multi-stimulus task-related component analysis (msTRCA) were used for classification. The database can be downloaded from the following link: https://drive.google.com/drive/folders/1TXuxU863nZoniZRgNWZy0PRuL8lhBuP4?usp=sharing . Conclusions: This research contributes to enhancing the use of SSVEP-based BCIs in practical settings by addressing user experience and system design challenges. The proposed user-friendly visual stimuli and ergonomic electrode design improve comfort and usability. The open dataset serves as a valuable resource for future studies, enabling the development of robust and efficient SSVEP- BCI systems suitable for industrial applications.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography