221,496 research outputs found

    The Mark 3 data base handler

    Get PDF
    A data base handler which would act to tie Mark 3 system programs together is discussed. The data base handler is written in FORTRAN and is implemented on the Hewlett-Packard 21MX and the IBM 360/91. The system design objectives were to (1) provide for an easily specified method of data interchange among programs, (2) provide for a high level of data integrity, (3) accommodate changing requirments, (4) promote program accountability, (5) provide a single source of program constants, and (6) provide a central point for data archiving. The system consists of two distinct parts: a set of files existing on disk packs and tapes; and a set of utility subroutines which allow users to access the information in these files. Users never directly read or write the files and need not know the details of how the data are formatted in the files. To the users, the storage medium is format free. A user does need to know something about the sequencing of his data in the files but nothing about data in which he has no interest

    An introduction to the Marshall information retrieval and display system

    Get PDF
    An on-line terminal oriented data storage and retrieval system is presented which allows a user to extract and process information from stored data bases. The use of on-line terminals for extracting and displaying data from the data bases provides a fast and responsive method for obtaining needed information. The system consists of general purpose computer programs that provide the overall capabilities of the total system. The system can process any number of data files via a Dictionary (one for each file) which describes the data format to the system. New files may be added to the system at any time, and reprogramming is not required. Illustrations of the system are shown, and sample inquiries and responses are given

    Penerapan Algoritma RSA (Rivest Shamir Adleman) Untuk Sistem Kriptografi File Audio MP3

    Get PDF
    The problem of data security is one of the important aspect of information technology. One solution that can be used to maintain data security is cryptography. Cryptography is a field of knowledge that use mathematical equations to perform encryption and decryption of data either by applying algorithms asymmetry such as the DSA (Digital Signature Algorithm), RSA, DH (Diffie-Hellman), ECC (Elliptic Curve Cryptography), and Cryptography Quantum. Of the many asymmetric algorithms are made, the most popular algorithm is the RSA algorithm. Security RSA algorithm lies in the difficulty of factoring large prime numbers are relative. To prove the security of the RSA algorithm is needed media as the data to be secured like the MP3 audio format. The MP3 format is one of the audio format most commonly used in the storage of audio data, because data is stored resemble the original data when recorded, and has a size that is not too large compared to other formats. Applications cryptographic system created in order to implement the RSA algorithm for encryption and decryption of MP3 audio files. The result is the application of a cryptographic system can encrypt the MP3 audio file can then decrypt back MP3 audio files that have been encrypted. MP3 audio files are encrypted still playable but his voice was not audible to the human ear so that the necessary application to decrypt the MP3 audio file to be played as before

    Low-cost digital system for power quality monitoring

    Get PDF
    This paper describes the development of a low cost digital system used for power quality monitoring and power management. The system uses voltage and current Hall sensors, a standard data acquisition board, and has its processing system based in LabVIEW™, running on a regular PC. The system acquires data continuously, and storage in files the events that result from the anomalies detected in the monitored power system. Several parameters related to power quality can be analysed through 6 different applications: “Scope and THD”, “Strip Chart”, “Wave Shape”, “Sags and Swells”, “Classical Values” and “p-q Theory Values”. The acquired information can be visualized in tables and/or in charts. It is also possible to generate reports in HTML format. In this format, the reports can be sent directly to a printer, can be embedded in other software applications, or can be accessed through the Internet, using a web browser. It is also shown the potential of the developed system, namely the advantages of virtual instrumentation, regarding to flexibility, cost and performance in the scope of power quality monitoring and power management (after acquisition, processing and analysing of the information, data and warnings can be sent through Internet or wireless technology).Fundação para a Ciência e a Tecnologia (FCT), POCTI/ESE/41170/2001

    The impace of custom ROM backups on android external storage erasure

    Get PDF
    The Android operating system is the current market leader on mobile devices such as smartphones and tablet computers. The core operating system is open source and has a number of developers creating variants of this operating system. These variants, often referred to as custom ROMs are available for a wide number of mobile devices. Custom ROMs provide a number of features, such as enhanced control over the operating system, variation in user interfaces and so on. The process of installing custom ROMs is often accomplished through the use of a ROM manager application. Such applications often provide mechanisms to back up the contents of the mobile device prior to upgrade. This mechanism is utilised in the case of a failed update to restore the device to its previous functional state. Backups produced in this manner are often stored in on an external media such as a micro-SD card.In the conducted research we evaluated devices inbuilt data erasure mechanisms within the context of erasure of backups produced by ROM managers. It was found that simply using the devices Format External / SD function is not an effective means of completely erasing these backups. Once recovered, these backups offer a quick source of information that a potential attacker could carve to retrieve user files such as media transferred to the external or from applications. Although the same files could be recovered from an image of the external storage itself, the carving process is more efficient than traditional carving methods

    The impace of custom ROM backups on android external storage erasure

    Get PDF
    The Android operating system is the current market leader on mobile devices such as smartphones and tablet computers. The core operating system is open source and has a number of developers creating variants of this operating system. These variants, often referred to as custom ROMs are available for a wide number of mobile devices. Custom ROMs provide a number of features, such as enhanced control over the operating system, variation in user interfaces and so on. The process of installing custom ROMs is often accomplished through the use of a ROM manager application. Such applications often provide mechanisms to back up the contents of the mobile device prior to upgrade. This mechanism is utilised in the case of a failed update to restore the device to its previous functional state. Backups produced in this manner are often stored in on an external media such as a micro-SD card.In the conducted research we evaluated devices inbuilt data erasure mechanisms within the context of erasure of backups produced by ROM managers. It was found that simply using the devices Format External / SD function is not an effective means of completely erasing these backups. Once recovered, these backups offer a quick source of information that a potential attacker could carve to retrieve user files such as media transferred to the external or from applications. Although the same files could be recovered from an image of the external storage itself, the carving process is more efficient than traditional carving methods

    Identification of fragmented JPEG files in the absence of file systems

    Get PDF
    Identifying fragmented and deleted files from scattered digital storage become crucial needs in computer forensic. Storage media experience regular space fragmentation which gives direct consequence to the files system series. This paper specifies a case where the jpeg files are heavily fragmented with absent file header which contains maximum information for the stored data can be easily retrieved. The problem is formulated using statistical byte frequency analysis for identifying the group of jpeg file fragments. Several related works have addressed the issue of classifying variety types of file format with high occurrence of being fragmented such as avi, doc, wav file and etc. These files have been tagged as among the larger file format. We provide techniques for identifying the pattern of file fragments distribution and describe roles of selected clustering attributes. Finally, we provide experimental results presenting that the jpeg fragments distribution can be retrieved with quite small gap differences between the groups

    Standards and practices for reporting plankton and other particle observations from images

    Get PDF
    This technical manual guides the user through the process of creating a data table for the submission of taxonomic and morphological information for plankton and other particles from images to a repository. Guidance is provided to produce documentation that should accompany the submission of plankton and other particle data to a repository, describes data collection and processing techniques, and outlines the creation of a data file. Field names include scientificName that represents the lowest level taxonomic classification (e.g., genus if not certain of species, family if not certain of genus) and scientificNameID, the unique identifier from a reference database such as the World Register of Marine Species or AlgaeBase. The data table described here includes the field names associatedMedia, scientificName/ scientificNameID for both automated and manual identification, biovolume, area_cross_section, length_representation and width_representation. Additional steps that instruct the user on how to format their data for a submission to the Ocean Biodiversity Information System (OBIS) are also included. Examples of documentation and data files are provided for the user to follow. The documentation requirements and data table format are approved by both NASA’s SeaWiFS Bio-optical Archive and Storage System (SeaBASS) and the National Science Foundation’s Biological and Chemical Oceanography Data Management Office (BCO-DMO).This report was an outcome of a working group supported by the Ocean Carbon and Biogeochemistry (OCB) project office, which is funded by the US National Science Foundation (OCE1558412) and the National Aeronautics and Space Administration (NNX17AB17G). AN, SB, and CP conceived and drafted the document. IC, IST, JF and HS contributed to the main body of the document as well as the example files. All members of the working group contributed to the content of the document, including the conceptualization of the data table and metadata format. We would also like thank the external reviewers Cecile Rousseaux (NASA GSFC), Susanne Menden-Deuer (URI) Frank Muller-Karger (USF), and Abigail Benson (USGS) for their valuable feedback

    TOWARDS A FORMAT REGISTRY FOR ENGINEERING DATA

    Get PDF
    ABSTRACT There has been a great deal of interest recently in the problem of long term archiving of digital data. This is especially so in engineering design, where the CAD software tools evolve rapidly but the manufactured products themselves have much longer lifetimes whose support requires archived design data in a usable form. The ISO Open Archival Information Systems (OAIS) Reference Model is a widely used standard for digital archiving, with an essential piece of this model being a file format registry. A file format registry is a system for housing information about file formats that allows for correct interpretation, rendering, storage, and translation of digital files. Currently there exists no file format registry specifically for CAD file formats. This paper explains the purpose of a file format registry for CAD in the greater context of digital archiving, and then presents our approach to creating a CAD file format registry using the Resource Description Framework (RDF) language of the Semantic Web. By creating our file format registry in RDF, we allow archival systems to perform automated reasoning on the stored files. We hope that this paper will increase awareness of this element of engineering design repositories in the research community of this conference

    Penerapan Algoritma RSA pada Sistem Kriptografi File Audio MP3

    Get PDF
    The problem of data security is one of the important aspect of information technology. One solution that can be used to maintain data security is cryptography. Cryptography is a field of knowledge that use mathematical equations to perform encryption and decryption of data either by applying algorithms asymmetry such as the DSA (Digital Signature Algorithm), RSA, DH (Diffie-Hellman), ECC (Elliptic Curve Cryptography), and Cryptography Quantum. Of the many asymmetric algorithms are made, the most popular algorithm is the RSA algorithm. Security RSA algorithm lies in the difficulty of factoring large prime numbers are relative. To prove the security of the RSA algorithm is needed media as the data to be secured like the MP3 audio format. The MP3 format is one of the audio format most commonly used in the storage of audio data, because data is stored resemble the original data when recorded, and has a size that is not too large compared to other formats. Applications cryptographic system created in order to implement the RSA algorithm for encryption and decryption of MP3 audio files. The result is the application of a cryptographic system can encrypt the MP3 audio file can then decrypt back MP3 audio files that have been encrypted. MP3 audio files are encrypted still playable but his voice was not audible to the human ear so that the necessary application to decrypt the MP3 audio file to be played as before
    • …
    corecore