405 research outputs found
Detection and Identification of Software Encryption Solutions in NT-based Microsoft Windows Operating Systems
As encrypted information is very difficult or impossible to reconstruct, there are many situations in which it is critical to detect the presence of encryption software before a computer is shut down. Currently there is no solution that reliably identifies installed encryption software.;For this investigation, thirty encryption software products for Microsoft Windows based on the NT-kernel have been identified and investigated. Operating system dependent factors such as registry, file attributes, operating system attributes, process list analysis and independent factors such as file headers, keyword search, Master Boot Record analysis as well as hashing of software components were investigated and allow the identification of these programs. The most reliable detection rate is achieved through a combination of the aforementioned factors
Term-driven E-Commerce
Die Arbeit nimmt sich der textuellen Dimension des E-Commerce an. Grundlegende Hypothese ist die textuelle Gebundenheit von Information und Transaktion im Bereich des elektronischen Handels. Überall dort, wo Produkte und Dienstleistungen angeboten, nachgefragt, wahrgenommen und bewertet werden, kommen natürlichsprachige Ausdrücke zum Einsatz. Daraus resultiert ist zum einen, wie bedeutsam es ist, die Varianz textueller Beschreibungen im E-Commerce zu erfassen, zum anderen können die umfangreichen textuellen Ressourcen, die bei E-Commerce-Interaktionen anfallen, im Hinblick auf ein besseres Verständnis natürlicher Sprache herangezogen werden
Data Hiding and Its Applications
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
Recommended from our members
A Comparative Study of Data Transformations for Efficient XML and JSON Data Compression. An In-Depth Analysis of Data Transformation Techniques, including Tag and Capital Conversions, Character and Word N-Gram Transformations, and Domain-Specific Data Transforms using SMILES Data as a Case Study
XML is a widely used data exchange format. The verbose nature of XML leads to the requirement to efficiently store and process this type of data using compression. Various general-purpose transforms and compression techniques exist that can be used to transform and compress XML data. More compact alternatives to XML data have been developed, namely JSON due to the verbosity of XML data.
Similarly, there is a requirement to efficiently store and process SMILES data used in Chemoinformatics. General-purpose transforms and compressors can be used to compress this type of data to a certain extent, however, these techniques are not specific to SMILES data.
The primary contribution of this research is to provide developers that use XML, JSON or SMILES data, with key knowledge of the best transformation techniques to use with certain types of data, and which compression techniques would provide the best compressed output size and processing times, depending on their requirements.
The main study in this thesis, investigates the extent of which using data transforms prior to data compression can further improve the compression of XML and JSON data. It provides a comparative analysis of applying a variety of data transform and data transform variations, to a number of different types of XML and JSON equivalent datasets of various sizes, and applying different general-purpose compression techniques over the transformed data.
A case study is also conducted, to investigate data transforms prior to compression to improve the compression of data within a data-specific domain.The files of software accompanying this thesis are unable to be presented online with the thesis
Proceedings, MSVSCC 2013
Proceedings of the 7th Annual Modeling, Simulation & Visualization Student Capstone Conference held on April 11, 2013 at VMASC in Suffolk, Virginia
Writing as Material Practice: Substance, Surface and Medium
Writing as Material Practice grapples with the issue of writing as a form of material culture in its ancient and more recent manifestations, and in the contexts of production and consumption. Fifteen case studies explore the artefactual nature of writing — the ways in which materials, techniques, colour, scale, orientation and visibility inform the creation of inscribed objects and spaces, as well as structure subsequent engagement, perception and meaning making. Covering a temporal span of some 5000 years, from c.3200 BCE to the present day, and ranging in spatial context from the Americas to the Near East, the chapters in this volume bring a variety of perspectives which contribute to both specific and broader questions of writing materialities. The authors also aim to place past graphical systems in their social contexts so they can be understood in relation to the people who created and attributed meaning to writing and associated symbolic modes through a diverse array of individual and wider social practices
Hypertextual Ultrastructures: Movement and Containment in Texts and Hypertexts
The surface-level experience of hypertextuality as formless and unbounded, blurring boundaries among texts and between readers and writers, is created by a deep structure which is not normally presented to readers and which, like the ultrastructure of living cells, defines and controls texts' nature and functions. Most readers, restricted to surface-level interaction with texts, have little access to the deep structure of any hypertext. In this dissertation, I argue that digital hypertexts differ essentially from paper texts in that hypertexts are constructed in multiple layers, with surface-level appearance and behavior controlled by sub-surface ultrastructure, and that these multiple layers of structure enable and necessitate new methods of textual study designed for digital texts.
Using participant-observation from within my own practice as a webmaster, I closely examine the sub-surface structural layers that create several kinds of Web-based digital hypertexts: blogs, forums, static Web pages, and dynamic Web pages. With these hypertexts as the primary models, along with their enabling software and additional digital texts-wikis, news aggregators, word processing documents, digital photographs, electronic mail, electronic forms-available to me as a reader/author rather than a webmaster, I demonstrate methods of investigating and describing the development of digital texts. These methods, like methods already established within textual studies to trace the development of printed texts, can answer questions about accidental and intentional textual change, the roles of collaborators, and the ways texts are shaped by production processes and mediating technologies. As a step toward a formalist criticism of hypertext, I propose concrete ways of categorizing, describing, and comparing hypertexts and their components. I also demonstrate techniques for visualizing the structures, histories, and interrelationships of hypertexts and explore methods of using self-descriptive surface elements in paper-like texts as partial substitutes for the sub-surface self-description available in software-like texts. By identifying digitization as a gateway to cooperation between human and artificial intelligences rather than an end in itself, I suggest natural areas of expansion for the humanities computing collaboration as well as new methodologies by which originally-printed texts can be studied in their digital forms alongside originally-digital texts
Европейский и национальный контексты в научных исследованиях
В настоящем электронном сборнике «Европейский и национальный контексты в научных исследованиях. Технология» представлены работы молодых ученых по геодезии и картографии, химической технологии и машиностроению, информационным технологиям, строительству и радиотехнике. Предназначены для работников образования, науки и производства. Будут полезны студентам, магистрантам и аспирантам университетов.=In this Electronic collected materials “National and European dimension in research. Technology” works in the fields of geodesy, chemical technology, mechanical engineering, information technology, civil engineering, and radio-engineering are presented. It is intended for trainers, researchers and professionals. It can be useful for university graduate and post-graduate students
CBSE: an implementation case study
Over the last couple of years, the shift towards component based software engineering (CBSE) methods has become a cost effective way to get an application to implementation stage much earKer. Adoption of Component Based Development methods acknowledges the use of third party components wherever possible to reduce the cost of software development, shorten the development phase and provide a richer set of processing options for the end user. The use of these tools is particularly relevant in Web based applications, where commercial off the shelf (COTS) products are so prevalent. However, there are a number of risks associated with the use of component based development methods. This thesis investigates these risks within the context of a software engineering project and attempts to provide a means to minimise and or at least manage the risk potential when using component based development method
- …