412,212 research outputs found

    A Covert Channel Using Named Resources

    Full text link
    A network covert channel is created that uses resource names such as addresses to convey information, and that approximates typical user behavior in order to blend in with its environment. The channel correlates available resource names with a user defined code-space, and transmits its covert message by selectively accessing resources associated with the message codes. In this paper we focus on an implementation of the channel using the Hypertext Transfer Protocol (HTTP) with Uniform Resource Locators (URLs) as the message names, though the system can be used in conjunction with a variety of protocols. The covert channel does not modify expected protocol structure as might be detected by simple inspection, and our HTTP implementation emulates transaction level web user behavior in order to avoid detection by statistical or behavioral analysis.Comment: 9 page

    Biodiversity informatics: the challenge of linking data and the role of shared identifiers

    Get PDF
    A major challenge facing biodiversity informatics is integrating data stored in widely distributed databases. Initial efforts have relied on taxonomic names as the shared identifier linking records in different databases. However, taxonomic names have limitations as identifiers, being neither stable nor globally unique, and the pace of molecular taxonomic and phylogenetic research means that a lot of information in public sequence databases is not linked to formal taxonomic names. This review explores the use of other identifiers, such as specimen codes and GenBank accession numbers, to link otherwise disconnected facts in different databases. The structure of these links can also be exploited using the PageRank algorithm to rank the results of searches on biodiversity databases. The key to rich integration is a commitment to deploy and reuse globally unique, shared identifiers (such as DOIs and LSIDs), and the implementation of services that link those identifiers

    Automatic Geotagging of Russian Web Sites

    Full text link
    The poster describes a fast, simple, yet accurate method to associate large amounts of web resources stored in a search engine database with geographic locations. The method uses location-by-IP data, domain names, and content-related features: ZIP and area codes. The novelty of the approach lies in building location-by-IP database by using continuous IP blocks method. Another contribution is domain name analysis. The method uses search engine infrastructure and makes it possible to effectively associate large amounts of search engine data with geography on a regular basis. Experiments ran on Yandex search engine index; evaluation has proved the efficacy of the approach.ACM Special Interest Group on Hypertext, Hypermedia, and We

    English and Scientific Alpha Code for the Birds of Nebraska

    Get PDF
    Alpha codes, abbreviations of common or scientific bird names, have long been used by ornithologists. The U.S. Bird Banding Laboratory\u27s employment of alpha codes has become an integral part of large ornithological programs across the United States and Canada. Rather than using the full English or scientific name of a bird species, alpha codes allow quicker data entry and can also help to cross-reference other data. The content of this article is a list of alpha codes, current through the American Ornithologists\u27 Union Checklist of North American Birds, Seventh Edition (1998), its following supplements (AOU: 2000, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010), and the most recent published Official List of the Birds of Nebraska: 2009 (NOU Records Committee 2009)

    English and Scientific Alpha Code for the Birds of Nebraska

    Get PDF
    Alpha codes, abbreviations of common or scientific bird names, have long been used by ornithologists. The U.S. Bird Banding Laboratory\u27s employment of alpha codes has become an integral part of large ornithological programs across the United States and Canada. Rather than using the full English or scientific name of a bird species, alpha codes allow quicker data entry and can also help to cross-reference other data. The content of this article is a list of alpha codes, current through the American Ornithologists\u27 Union Checklist of North American Birds, Seventh Edition (1998), its following supplements (AOU: 2000, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010), and the most recent published Official List of the Birds of Nebraska: 2009 (NOU Records Committee 2009)

    QR Code Integrity Verification Based on Modified SHA-1 Algorithm

    Get PDF
    The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology. This paper identified the requirements needed in the certificate verification that uses the modified SHA-1. The application was tested using legitimate and fraudulent certificates. Based on the results, the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. During the trial run of the app, four test cases were seen which involves correct names and QR codes, and three other possible test cases of faking certificates such as modification of the name, regeneration of QR codes using valid hash and a fake name, and modification of the QR code. Although these cases exist, the app successfully verified all thirty certificates correctly. Also, it is noticed that during the scanning, the smartphone camera should be in focus to capture the QR code clearly

    Studi Perbandingan Analisa Harga Satuan Pekerjaan Tahun 2016 Dan 2022 Bidang Cipta Karya

    Get PDF
    Cost estimation is a very important component in a construction. Estimated construction costs can be calculated using various methods, one of which is using the unit price analysis method. The unit price analysis method for work has undergone an update in 2022 which updated the method in the previous year. Therefore this research was carried out to conduct a study by directly comparing the two cost estimation methods to find out the comparison and make a record of what is the difference in the unit price analysis. the 2016 and 2022. Data analysis techniques used in this research are: literature review and direct comparison of analysis codes, job names, descriptions of resources used, resource codes, units, and coefficients. From the results of the study and direct comparison, two general criteria were obtained, namely the criteria for change and constant. In the first general criteria, there are seven more specific change criteria, namely name or code changes, changes in the description of the resources used, changes in coefficients, changes in codes and units, transfers, additions and deletions. After recording, a total of 779 comparisons were found between the 2016 and 2022 unit price analysis cost estimation methods

    Computer Geolocation Using Extracted Features

    Get PDF
    This paper compares the extracted feature data from a sample set of hard drive images in an effort to relate the features to the physical location of the drive. A list of probable zip codes, phone numbers, place names, and IP addresses are extracted from raw drive images and compared to manually identified geolocation data. The results of the individual extractions are then analyzed to determine the feasibility in using automated extraction and analysis techniques for geolocating hard drives. Keywords: hard disk forensics, geocoding, geolocatio

    A Pathway Analysis Tool for Analyzing Microarray Data of Species with Low Physiological Information

    Get PDF
    Pathway information provides insight into the biological processes underlying microarray data. Pathway information is widely available for humans and laboratory animals in databases through the internet, but less for other species, for example, livestock. Many software packages use species-specific gene IDs that cannot handle genomics data from other species. We developed a species-independent method to search pathways databases to analyse microarray data. Three PERL scripts were developed that use the names of the genes on the microarray. (1) Add synonyms of gene names by searching the Gene Ontology (GO) database. (2) Search the Kyoto Encyclopaedia of Genes and Genomes (KEGG) database for pathway information using this GO-enriched gene list. (3) Combine the pathway data with the microarray data and visualize the results using color codes indicating regulation. To demonstrate the power of the method, we used a previously reported chicken microarray experiment investigating line-specific reactions to Salmonella infection as an example

    Phonology is not accessed earlier than orthography in Chinese written production: evidence for the orthography autonomy hypothesis

    Get PDF
    The contribution of orthographic and phonological codes to written production remains controversial. We report results using a picture word interference task in which participants were asked to write (Experiments 1 and 2) or to speak (Experiment 3) the names of pictures while trying to ignore visual distractors, and the interval between the target and distractor onset was varied. Distractors were orthographically plus phonologically related, orthographically related, phonologically related, or unrelated to picture names. For written production, we found an exclusive orthographic effect at an early stage, reflecting a fast and direct link between meaning and graphemic lexicon, and we demonstrated that orthographic codes can be accessed directly from meaning in healthy adults. We also found orthographic and phonological effects at a later stage, reflecting a slow and indirect link between meaning and graphemic lexicon via phonology. Furthermore, the absence of an interaction effect of orthographic and phonological facilitation on written latencies suggests that the two effects are additive in general and that they might occur independently in written production in Chinese. For spoken production, we found that orthographic and phonological effects occur simultaneously in spoken production and that the two effects are additive at an early stage but interactive at a later stage. The temporal courses and their interplay of orthographic and phonological effects are dissociative in written and spoken production. Our findings thus support the orthography autonomy hypothesis, rather than the obligatory phonological mediation hypothesis, in written production in Chinese (as a non-alphabetic script)
    corecore