118 research outputs found

    Using Perl for Statistics: Data Processing and Statistical Computing

    Get PDF
    In this paper we show how Perl, an expressive and extensible high-level programming language, with network and ob ject-oriented programming support, can be used in processing data for statistics and statistical computing. The paper is organized in two parts. In Part I, we introduce the Perl programming language, with particular emphasis on the features that distinguish it from conventional languages. Then, using practical examples, we demonstrate how Perl's distinguishing features make it particularly well suited to perform labor intensive and sophisticated tasks ranging from the preparation of data to the writing of statistical reports. In Part II we show how Perl can be extended to perform statistical computations using modules and by "embedding" specialized statistical applications. We provide example on how Perl can be used to do simple statistical analyses, perform complex statistical computations involving matrix algebra and numerical optimization, and make statistical computations more easily reproducible. We also investigate the numerical and statistical reliability of various Perl statistical modules. Important computing issues such as ease of use, speed of calculation, and efficient memory usage, are also considered.

    SINGLE SIGN ON SYSTEM

    Get PDF
    This report is provided to explain regarding the Single Sign-On system. In this report, it will give a thorough view on Single Sign-On focusing on the system purpose, scope of study, methodology, results and conclusion. For the purpose point of view, this system is a type of software authentication that enables a userto authenticate once and gainaccess to the resources of multiple software systems. This is to make sure that the user authentication process becomes easy as they don't have to enter multiple usernames and passwords for multiple systems. In order to achieve this objective, the scope of the system has to be analyzed first. For this system, it will only relate to the systemsthat are web-based applications. In other words, we can call this system as Single Sign-On Web Portal. For the methodology part, PHP language as well as Apache server will be used to complete this project. It is one of the most demanding types of programming language nowadays. This system will also be divided into 2 parts: user interface and administration interface. For the results part, this report will shown the work progress as well as the screenshot of the system interface. The discussions along the work progress will also being included. Last but not, for the conclusion part, this report will conclude all the work done and provide recommendation for system enhancement in the future. This report will be guidance through out the system, from the first it being planned until the end product comes out

    Buffer overflow attacks & countermeasures

    Get PDF
    Often security website’ headlines read: "Buffer overflow in vendor’s product allows intruders to take over computer!” What can software engineering education do about this situation? In this document we have tried to point out how dangerous buffer overflow attacks can be and the amount of damage they are capable of incurring. We have shown several vulnerable applications both past as well as recent. The objective of this study is to take one inside the buffer overflow attack and bridge the gap between the “descriptive account” and the “technically intensive account”. The intent is to provide a logical, detailed, and technical explanation of the buffer overflow problem and the exploit that can be well understood by all. We have successfully coded several exploits and developed programs to demonstrate the effectiveness of such attacks

    GANN: Genetic algorithm neural networks for the detection of conserved combinations of features in DNA

    Get PDF
    BACKGROUND: The multitude of motif detection algorithms developed to date have largely focused on the detection of patterns in primary sequence. Since sequence-dependent DNA structure and flexibility may also play a role in protein-DNA interactions, the simultaneous exploration of sequence- and structure-based hypotheses about the composition of binding sites and the ordering of features in a regulatory region should be considered as well. The consideration of structural features requires the development of new detection tools that can deal with data types other than primary sequence. RESULTS: GANN (available at ) is a machine learning tool for the detection of conserved features in DNA. The software suite contains programs to extract different regions of genomic DNA from flat files and convert these sequences to indices that reflect sequence and structural composition or the presence of specific protein binding sites. The machine learning component allows the classification of different types of sequences based on subsamples of these indices, and can identify the best combinations of indices and machine learning architecture for sequence discrimination. Another key feature of GANN is the replicated splitting of data into training and test sets, and the implementation of negative controls. In validation experiments, GANN successfully merged important sequence and structural features to yield good predictive models for synthetic and real regulatory regions. CONCLUSION: GANN is a flexible tool that can search through large sets of sequence and structural feature combinations to identify those that best characterize a set of sequences

    Development Information System to support activities of Nang Loeng Community, Bangkok

    Get PDF
    รายงานวิจัย -- มหาวิทยาลัยเทคโนโลยีราชมงคลพระนคร, 2555The objectives of this research are to analysis, design and develop the Information System to support activities of Nang Loeng Community, Bangkok. Also to install, test and evaluate the system. To develop the System Development Life Cycle (SDLC) method is used. To develop and implement PHP script language and MySQL database management system are used. And the system is installed on the Internet Server. To evaluate the satisfaction, the 2 groups are the samples, the first is the group of 19 operation users and the second is the groups of 30 general users. Convenience sampling is used for sampling method. Gathered and analyzed the data by statistical processing program for Windows software. The result of research show that the satisfaction of the first group (19 operation users) about input screen a data entry is in a good level (x=4.00). About working process and reporting of the system is in a good level (x=4.15), the satisfaction of the group is a good level (x=4.08) The satisfaction of the group (43 general users), the results appear in the same level to the satisfaction of the first group in every case (x=4.21). So, the research results can be concluded that all samples are highly satisfied with this information system. And this system can be installed in real working and suit the user requirement.Rajamangala University of Technology Phra Nakho

    Hierarchical categorisation of tags for delicious

    Get PDF
    In the scenario of social bookmarking, a user browsing the Web bookmarks web pages and assigns free-text labels (i.e., tags) to them according to their personal preferences. In this technical report, we approach one of the practical aspects when it comes to represent users' interests from their tagging activity, namely the categorization of tags into high-level categories of interest. The reason is that the representation of user profiles on the basis of the myriad of tags available on the Web is certainly unfeasible from various practical perspectives; mainly concerning the unavailability of data to reliably, accurately measure interests across such fine-grained categorisation, and, should the data be available, its overwhelming computational intractability. Motivated by this, our study presents the results of a categorization process whereby a collection of tags posted at Delicious #http://delicious.com# are classified into 200 subcategories of interest.Preprin

    Portable TCP/IP server design

    Get PDF
    There are a number of known architectural patterns for TCP/IP server design. I present a survey of design choices based on some of the most common of these patterns. I have demonstrated, with working code samples, that most of these architectural patterns are readily portable between UNIX and Windows NT platforms without necessarily incurring significant performance penalties.ComputingM. Sc. (Computer Science

    Predictable scheduling for digital audio

    Get PDF
    ManuscriptThis paper presents results from applying the Rialto/ NT scheduler to some real Windows 2000 application scenarios. We report on two aspects of this work. First, we studied the reliability of an audio player application and the middleware and kernel components running beneath it in order to assess its reliability under various concurrent application loads. Then we added CPU Reservations to portions of the workload in order to determine if doing so would increase playback reliability under workloads in which problems were previously seen. We report on the benefits and problems observed when using reservations in these real-world scenarios. We also describe the methodologies we used to analyze the real-time behavior of the operating system and applications, including the use of instrumented kernels to produce execution traces. Finally, we describe several improvements in the Rialto/NT implementation that have been made since the system was originally described

    Exploration of a framework for behavior-based malware detection and classification

    Get PDF
    Master'sMASTER OF SCIENC
    corecore