5,332 research outputs found

    Image processing mini manual

    Get PDF
    The intent is to provide an introduction to the image processing capabilities available at the Langley Research Center (LaRC) Central Scientific Computing Complex (CSCC). Various image processing software components are described. Information is given concerning the use of these components in the Data Visualization and Animation Laboratory at LaRC

    Beginner's Guide for Cybercrime Investigators

    Get PDF
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be observed immediately the apparent lack of box jewelry, penetration of an accounting server can be detected after a few months when all clients have given up the company services because of the stolen data came to competition and have helped it to make best deals. Cybercrime is a phenomenon of our time, often reflected in the media. Forensic investigation of computer systems has a number of features that differentiate it fundamentally from other types of investigations. The computer itself is the main source of information for the investigator. CONTENTS: Computing systems and storage media - Computing devices - - Peripheral devices - - External drives for media storage - Typology of data stored on specific supports – File systems - - Program that allows working with ” inactive” space - Information that can be obtained from the computing system environment Computer networks - Copper wire in computer networks - Optical fibers - Wireless LAN - Internet and Intranet Software and services - Client/server architecture - Protocols and Standards - Internet Services - - e-Mail - - - Spam - - HTTP - - Web address - URL - - Web browsers - - - Browser cookies - - Working with web pages - - - Choosing your favorite web pages - - - Keeping track of visited web pages - - - Saving web pages - - Proxy servers - - Privacy on the Internet - FTP - Instant Messaging - Peer-to-peer networks Vulnerabilities - The first attacks on the Internet - Cybercrime - - Typologies of cyber attackers - - - Classification of cyber attackers according to their skills and objectives - Classification of risks and incidents in cyberworld - - Classification as a list of terms - - List of categories - - Categories of results - - Empirical lists - Events, attacks and incidents - Online security events, actions, and targets - - Actions - - Targets - Attacks - - Tools - - Vulnerabilities - - Unauthorized results Cybercrime laws - The concept of "cybercrime" Investigations - Computer forensic investigations - Digital evidence - Digital sampling during investigations - The suspect - Witnesses in cybercrime - Transporting of samples in laboratory - Analysis of samples - Preparing team members - Computer tools Convention on Cybercrime - Preamble - Chapter I – Use of terms - Chapter II – Measures to be taken at the national level - - Section 1 – Substantive criminal law - - - Title 1 – Offences against the confidentiality, integrity and availability of computer data and systems - - - Title 2 – Computer-related offences - - - Title 3 – Content-related offences - - - Title 4 – Offences related to infringements of copyright and related rights - - - Title 5 – Ancillary liability and sanctions - - Section 2 – Procedural law - - - Title 1 – Common provisions - - - Title 2 – Expedited preservation of stored computer data - - - Title 3 – Production order - - - Title 4 – Search and seizure of stored computer data - - - Title 5 – Real-time collection of computer data - - Section 3 – Jurisdiction - Chapter III – International co-operation - - Section 1 – General principles - - - Title 1 – General principles relating to international co-operation - - - Title 2 – Principles relating to extradition - - - Title 3 – General principles relating to mutual assistance - - - Title 4 – Procedures pertaining to mutual assistance requests in the absence of applicable international agreements - - Section 2 – Specific provisions - - - Title 1 – Mutual assistance regarding provisional measures - - - Title 2 – Mutual assistance regarding investigative powers - - - Title 3 – 24/7 Network - Chapter IV – Final provisions Recommendation No. R (95) 13 - Appendix to Recommendation No. R (95) 13 - - I. Search and seizure - - II. Technical surveillance - - III. Obligations to co-operate with the investigating authorities - - IV. Electronic evidence - - V. Use of encryption - - VI. Research, statistics and training - - VII. International co-operation Rules for obtaining digital evidence by police officers Standards in the field of digital forensics Principles in digital evidence Procedures model for the forensic examination - Hard disk examination Code of Ethics Sources and references About - Nicolae Sfetcu - - By the same author - - Contact Publishing House - MultiMedia Publishin

    A beginner's guide to belief revision and truth maintenance systems

    Get PDF
    This brief note is intended to familiarize the non-TMS audience with some of the basic ideas surrounding classic TMS's (truth maintenance systems), namely the justification-based TMS and the assumption-based TMS. Topics of further interest include the relation between non-monotonic logics and TMS's, efficiency and search issues, complexity concerns, as well as the variety of TMS systems that have surfaced in the past decade or so. These include probabilistic-based TMS systems, fuzzy TMS systems, tri-valued belief systems, and so on

    Determining the quality of mathematical software using reference data sets

    Get PDF
    This paper describes a methodology for evaluating the numerical accuracy of software that performs mathematical calculations. The authors explain how this methodology extends the concept of metrological traceability, which is fundamental to measurement, to include software quality. Overviews of two European Union-funded projects are also presented. The first project developed an infrastructure to allow software to be verified by testing, via the internet, using reference data sets. The primary focus of the project was software used within systems that make physical measurements. The second project, currently underway, explores using this infrastructure to verify mathematical software used within general scientific and engineering disciplines. Publications on using reference data sets for the verification of mathematical software are usually intended for a readership specialising in measurement science or mathematics. This paper is aimed at a more general readership, in particular software quality specialists and computer scientists. Further engagement with experts in these disciplines will be helpful to the continued development of this application of software quality

    A study of the problems associated with Dalangdian reservoir, China

    Get PDF
    There are over 2,300 lakes over 1 km2 in China (total area 80 000 km2). In addition there are approximately 87 000 reservoirs with a storage capacity of 413 billion m3. These form the main supply of drinking water as well as water for industrial and agricultural production and aquaculture. Because of a lack of understanding of the frailty of lake ecosystems and poor environmental awareness, human activities have greatly affected freshwater systems. This article focuses on the problems of one water supply reservoir, Dalangdian Reservoir, and considers options for improving its management. Dalangdian Reservoir is described and occurrence of algal genera given. The authors conclude with remarks on the future of the Dalangdian Reservoir

    PAN AIR summary document (version 1.0)

    Get PDF
    The capabilities and limitations of the panel aerodynamics (PAN AIR) computer program system are summarized. This program uses a higher order panel method to solve boundary value problems involving the Prandtl-Glauert equation for subsonic and supersonic potential flows. Both aerodynamic and hydrodynamic problems can be solved using this modular software which is written for the CDC 6600 and 7600, and the CYBER 170 series computers

    Issues in Handwriting Instruction

    Get PDF

    Museletter: Fall 1995

    Get PDF
    Table of Contents: Majority of Students On-Line Fall Break Hours Who\u27s Who in the Library Circulation History of the Net Glossary of Internet Jargonhttps://scholarship.richmond.edu/museletter/1021/thumbnail.jp

    Uncertainty assessment for measurement processes in the aerospace manufacturing industry

    Get PDF
    Measurement processes are critical to the aerospace industry, which products must follow strict regulations and customer requirements. Additionally, measurement of uncertainty is fast becoming a requirement from both certification bodies and customers. An uncertainty assessment must be carried out for all processes that need to add an uncertainty statement to the measurement result. In order to maintain defined quality standards, aerospace manufacturing companies need to identify all measurement disciplines that benefit from stating the level of uncertainty and define a methodology to calculate it for complex measurement processes. An extensive research has been conducted in order to define the most appropriate methodology to assess uncertainty on complex aerospace components and a case study has been applied to assess the strain gauge calibration test uncertainty of different aerospace components. This study develops a generic framework, which helps the assessment of all individual sources of uncertainty and completes the one established by the Guide to the Expression of Uncertainty in Measurement. Conclusions have been extracted from the outcome of the case study. The conducted research contributes to a better understanding of measurement processes and good practices that lead to lower uncertainty. The outcome will help manufacturing companies to be aware of the contributors of uncertainty to the tests, how to reduce this uncertainty and the reliability of the measurements taken during the process

    A Beginner\u27s Guide to Research Using Electronic Health Record Data

    Get PDF
    Since the passage of the American Recovery and Reinvestment Act in 2009, the use of Electronic Health Records (EHRs) in the healthcare system has increased substantially. Accompanying this surge in EHR usage is a surge in healthcare data and increased opportunities to improve our understanding of health care through research using these data. The use of EHR data for research has many benefits, limitations and considerations. Using data that was originally intended to facilitate billing, insurance, and maintenance of clinical records for research can be fraught with challenges, but they can also be a rich source of information. This paper addresses some of these benefits and challenges, along with additional considerations, including ensuring the best quality data, selecting a good study design, tailoring research questions and queries to available data, and understanding ethical issues in using patient data for research. Researchers should develop a clear understanding of the pitfalls inherent in EHR research before beginning a project. As is the case with most research, many of the drawbacks can be reduced with careful preparation, formulation of a research question, procedures and data management
    • …
    corecore