6 research outputs found

    File integrity monitor scheduling based on file security level classification

    Get PDF
    Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity monitoring tools are widely used to detect any malicious modification to these critical files. Two methods, off-line and on-line file integrity monitoring have their own disadvantages. This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. The initial testing result shows that our system is effective in on-line detection of file modification

    Towards a dynamic file integrity monitor through a security classification

    Get PDF
    File is a component of a computer system that has importance value of its own, either in terms of availability, integrity, confidentiality and functionality to a system and application. If unintended changes happen on the related file, it may affect the security of related computer system. File integrity monitor (FIM) tools is widely used to minimize the file security risk. This paper proposed dynamic schedule for FIM. This paper presents a dynamic scheduling for FIM by combining on-line and off-line monitoring based on related files security requirement. Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. The initial testing result shows that our system is effective in on-line detection of file modification

    Task mapping and routing optimization for hard real-time Networks-on-Chip

    Get PDF
    Interference from high priority tasks and messages in a hard real-time Networks-on-Chip (NoC) create computation and communication delays. As the delays increase in number, maintaining the system’s schedulability become difficult. In order to overcome the problem, one way is to reduce interference in the NoC by changing task mapping and network routing. Some population-based heuristics evaluate the worst-case response times of tasks and messages based on the schedulability analysis, but requires a significant amount of optimization time to complete due to the complexity of the evaluation function. In this paper, we propose an optimization technique that explore both parameters simultaneously with the aim to meet the schedulability of the system, hence reducing the optimization time. One of the advantages from our approach is the unrepeated call to the evaluation function, which is unaddressed in the heuristics that configure design parameters in stages. The results show that a schedulable configuration can be found from the large design space

    A survey of NewSQL DBMSs focusing on taxonomy, comparison and open issues

    No full text
    Advancements in internet, cloud, and business intelligence technologies, as well as the emergence of big data, have caused massive traffic in online transaction processing (OLTP) systems.All these impose the needs for effective and efficient data storage and processing which is not available in conventional Relational Database Management Systems (RDBMSs). In the year2000, a new generation of database management systems (DBMSs)called Not Only Structured Query Language (NoSQL) has emerged to address the scalability of OLTP workloads in a way that was impossible for conventional relational database management systems(RDBMSs). Despite adequately addressing issues linked to scalability and producing better read-write performance than RDBMS,NoSQL DBMSs appear to lack in providing definite assurance of data consistency. Hence, a newer DBMS alternative called NewSQLhas emerged. NewSQL DBMS has combined the advantages of both conventional RDBMS and NoSQL. They have the scalable performance of NoSQL DBMSs and the data consistency of traditional RDBMS. To date, there are tens of existing NewSQL-DBMSs,so it is difficult to understand the difference between them, andit is also quite challenging to decide the best solution for a specific task. Hence, this paper presents a comprehensive review concerning NewSQL-DBMSs by emphasizing the following purposes:(1) providing researchers and practitioners guidance that may assist in selecting the most appropriate NewSQL-DBMS, (2) classifying NewSQL-DBMSs based on internal implantation and number of tiers, (3) providing comparisons and analyses of query capabilities,technical characteristics, and security attributes of the prominent NewSQL-DBMSs, and finally, (4) identifying issues and challenges raised with the emergence of NewSQL-DBMSs. In conclusion,NewSQL DBMSs can offers solutions for fault tolerance, horizontal scalability features

    Document forensic, the fiqh and the Syariah Courts

    Get PDF
    Technological progress has made falsification of documents increasingly sophisticated and the need for forensic experts or Ra'yu al-Khabir indispensable in the Syariah Courts. This paper discusses the concept and methods of forensic document authentication by experts according to the Islamic law (fiqh). This study combined quantitative and qualitative approaches whereby 181 key informants comprising randomly sampled syariah and civil law experts and practitioners underwent in-depth interviews . Content analysis of the study revealed that respondent knowledge of document authentication methods according to the Islamic law was at the intermediate level with the mean = 3.59 and sd = 0.63 which was not enough to help the Syariah Courts cope with the rapid increase in the falsification rate of documents. This situation needs urgent redress and calls for the establishment of a comprehensive forensic model to provide adequate guidelines for judges and practitioners of the Syariah Courts

    Review of the Methods to Optimize Power Flow in Electric Vehicle Powertrains for Efficiency and Driving Performance

    No full text
    Electric vehicles (EV) are quickly gaining a foothold in global markets due to their zero tailpipe emissions and increasing practicality in terms of battery technologies. However, even though EV powertrains emit zero emissions during driving, their efficiency has not been fully optimized, particularly due the commonly used single-speed transmission. Hence, this paper provides an extensive review on the latest works carried out to optimize the power flow in EV powertrains using multispeed discrete transmission, continuously variable transmission and multi-motor configurations. The relevant literatures were shortlisted using a keyword search related to EV powertrain in the ScienceDirect and Scopus databases. The review focused on the related literatures published from 2018 onwards. The publications were reviewed in terms of the methodologies applied to optimize the powertrain for efficiency and driving performance. Next, the significant findings from these literatures were discussed and compared. Finally, based on the review, several future key research areas in EV powertrain efficiency and performance are highlighted
    corecore