80 research outputs found

    Structural Entropy and Metamorphic Malware

    Get PDF
    Metamorphic malware is capable of changing its internal structure without al- tering its functionality. A common signature is nonexistent in highly metamorphic malware. Consequently, such malware may remain undetected even under emulation and signature scanning combined. In this project, we use the concept of structural entropy to analyze variations in the complexity of data within a file. The process consists of two stages, namely, file segmentation and sequence comparison. In the file segmentation stage, we use entropy measurements and wavelet analysis to segment a file. The second stage measures the similarity of files by computing the edit distance between sequence segments. We apply this technique to the metamorphic detection problem and show that we can obtain strong results in certain challenging cases

    Mashup Destinies

    Get PDF
    "At the core of AMELOGENESIS IMPERFECTA (HOW DEEP IS THE SKIN OF TEETH) in grunt gallery’s Media Lab is a dramatically stage-lit laboratory-like setup re ecting Khang’s experimental biological research during his 2010 residency at the SymbioticA Centre of Excellence in Biological Arts, University of Western Australia in Perth, that brought together his commingled interests and training in contemporary art and dental science." -- p. [2]

    Locating scriptural authority in Charles Chauncy's Universalism

    Full text link
    Charles Chauncy remains an important transitionary figure between eighteenth century Puritan orthodoxy and nineteenth century liberal Congregationalism. Many historians imagined Chauncy as a figure caught between the revelatory experiences of the Great Awakening and the rational social ethos of the Revolutionary War. This framework has helped historians harmonize Chauncy’s traditional Calvinism and his progressive Universalism, especially as they understand Chauncy’s publications on Universalism: The Mystery Hid From Ages, The Benevolence of the Deity, and Five Dissertations. Read together, these three works comprise a Universalism canon that portrays Chauncy as a theologian compromising between two extremes: reason and revelation. Read separately, however, demands a more nuanced view of Chauncy beyond portrayals of him as a religious innovator or an indecisive theologian. Chauncy’s strict adherence to scripture complicates this paradigm. On the surface, Chauncy’s biblicism illustrates his adherence to Puritan methods of epistemology. A deeper analysis of scriptural authority’s shifting role in Chauncy’s canon demonstrates an individual negotiating his abiblical environment with the texts of scripture . While historians have demonstrated the ways in which hermeneutical decisions arise from the social and political situations faced by individuals like Chauncy, few have investigated the ways in which scripture also facilitates religious transitions, at times even the decline of its influence in social and political contexts. Chauncy’s inclusion and omissions of scripture in his publications demonstrated the ways in which eighteenth century biblical canon struggled to adapt to an eighteenth century context. Recognizing this, Chauncy grounded his Universalism on scripture by appropriating John Taylor’s exegetical approaches to rebut the abiblical Universalism of John Murray or the rationalist of deists like Thomas Paine. But by the nineteenth century, New England Congregationalism demonstrated the fruits of a Chauncy’s labors: a steep decline in reliance upon biblical authority. While Chauncy had demonstrated the possibility of a biblical foundation for his Universalism, he may have also inadvertently diminished the need for it as he compromised on biblical authority in his works on Universalism. These compromises foreshadowed the challenges to scriptural authority in the nineteenth century

    PENGARUH MEDIA APLIKASI MACROMEDIA DIRECTOR MX 2004 TERHADAP HASIL BELAJAR SISWA KELAS X PADA MATA PELAJARAN KOMPUTER DAN JARINGAN DASAR

    Get PDF
    Abstract. The problem that occurs is the teaching and learning activities in the classroom centeredon the media used by the teacher. The media used by teachers for presentations is to only usedpowerpoint applications that contain theories only, and teachers also sometimes used the lectureand question and answer method, when delivered material. So students do not understand thematerial presented by the teacher. The purpose of this study was to determine The Effect ofMacromedia Director MX 2004 Application Media Towards Students’ Outcomes Class X inComputer Subjects and Basic Networks at SMKN 1 Lingsar, West Lombok Regency in AcademicYear 2019/2020.. Data collection techniques in this study used the test as the main method whiledocumentation and observation as a complement. Data analysis techniques in this study used the ttest formula. The results obtained from the results of the t-test showed the t-test of 43.85, thenbased on a significant level of 5% and N = 37 it turned out that the amount of the rejection of thenull hypothesis stated in the table was 2.042. This statement shows that the t-test value was greaterthan t-table (43.85> 2.042), because t-test was greater than t-table, this research was said to besignificant. This means that the null hypothesis was rejected and the alternative hypothesis wasaccepted which reads: There was The Effect of Macromedia Director MX 2004 Application MediaTowards Students’ Outcomes Class X in Computer Subjects and Basic Networks at SMKN 1Lingsar, West Lombok Regency in Academic Year 2019/2020., so it can be concluded that theresults of this study are “significant”

    Prevalence and associated risk factors of violence against conflict-affected female adolescents:A multi-country, cross-sectional study

    Get PDF
    Over half of displaced civilians in humanitarian emergencies are children, and these settings pose unique threats to children's safety with long-lasting consequences. Our study broadens the limited evidence on violence against adolescent girls in emergencies by estimating prevalence and predictors of violence among adolescent girls aged 13-14 in South Kivu, Democratic Republic of the Congo (DRC), and aged 13-19 in refugee camps in the Benishangul-Gumuz region of Ethiopia.Survey data were collected from a sample of 1296 adolescent girls using Computer-Assisted Personal Interview and Audio Computer-Assisted Self-Interview programming. Predictors of violence were modeled using multivariable logistic regression.The majority of adolescent girls (51.62%) reported experiencing at least one form of violence victimization in the previous 12 months: 31.78% reported being hit or beaten, 36.79% reported being screamed at loudly or aggressively, and 26.67% experienced unwanted sexual touching, forced sex, and/or sexual coercion. Across both countries, ever having a boyfriend and living with an intimate partner were strong predictors of violence. Fewer years of education completed in DRC, and young age in Ethiopia, were also associated with reported victimization.Prevalence of violence against adolescent girls is high in these two conflict-affected contexts. Findings indicate a need for programs targeting younger populations, broader efforts to address different forms of victimization, and increased recognition of intimate partners and caregivers as perpetrators of violence in conflict-affected settings

    A system architecture and simulation environment for building information modeling in virtual worlds

    Get PDF
    The Peter Kiewit Institute (PKI) occupies a 192,000 square foot building on the University of Nebraska at Omaha’s (UNO’s) Pacific Street campus. PKI is home to approximately 85 faculty and 11 academic programs serving 1,800 students from two colleges: the University of Nebraska- Lincoln (UNL) College of Engineering and the UNO College of Information Science and Technology. In the summer of 2012, the research team wrote a paper summarizing a year’s worth of research concerning the integration of building information models and virtual worlds. The specific virtual world used was Science Applications International Corporation’s (SAIC’s) On- Line Interactive Virtual Environment (OLIVE). This research began when PKI students interested in modeling and simulation established the PKI Society for Computer Simulation International (SCS) Student Chapter and formed a research partnership with SAIC. Through this partnership, the team gained valuable experience with OLIVE and its many existing applications, including collaboration, training, education, and data visualization. It then became apparent that a potential additional application of OLIVE was architectural visualization. Using a virtual world to explore building plans before they are finalized was a significant improvement over traditional architectural renderings because the structure could be seen at any angle instead of at one fixed view point

    Disclosure bias for group versus individual reporting of violence amongst conflict-affected adolescent girls in DRC and Ethiopia

    Get PDF
    Methodologies to measure gender-based violence (GBV) have received inadequate attention, especially in humanitarian contexts where vulnerabilities to violence are exacerbated. This paper compares the results from individual audio computer-assisted self-administered (ACASI) survey interviews with results from participatory social mapping activities, employed with the same sample in two different post-conflict contexts. Eighty-seven internally displaced adolescent girls from the Democratic Republic of the Congo and 78 Sudanese girls living in Ethiopian refugee camps were interviewed using the two methodologies. Results revealed that the group-based qualitative method elicited narratives of violence focusing on events perpetrated by strangers or members of the community more distantly connected to girls. In contrast, ACASI interviews revealed violence predominantly perpetrated by family members and intimate partners. These findings suggest that group-based methods of information gathering frequently used in the field may be more susceptible to socially accepted narratives. Specifically, our findings suggest group-based methods may produce results showing that sexual violence perpetrated by strangers (e.g., from armed groups in the conflict) is more prevalent than violence perpetrated by family and intimate partners. To the extent this finding is true, it may lead to a skewed perception that adolescent GBV involving strangers is a more pressing issue than intimate partner and family-based sexual violence, when in fact, both are of great concern

    The State of Global Air Quality Funding 2022

    Get PDF
    The only global snapshot of clean air funding from donor governments and philanthropic foundations. This report highlights funding trends and gaps in 2015-2021, as well as recommendations for smarter investment for people and planet.99% of the world's population breathes air that exceeds World Health Organization air quality guidelines. Cleaning the air is a massive opportunity to improve public health and climate change. Because air pollution and climate change are mainly caused by burning fossil fuels, these problems can be tackled together. By addressing these issues in isolation, funders and policymakers drastically overlook the potential of clean air to realise multiple health, social and sustainable economic benefits.Our fourth annual report is the only global snapshot of projects funded by international development funders and philanthropic foundations to tackle air pollution. We identify gaps in funding, and opportunities for strategic investment and collaboration for systemic change.?As the world prepares for COP27 in Egypt, we call for more joined up policies and funding to address air pollution, climate change and unsustainable economic growth simultaneously. This report provides recommendations for decision makers, policy makers and philanthropic foundations

    How gender- and violence-related norms affect self-esteem among adolescent refugee girls living in Ethiopia.

    Get PDF
    BACKGROUND: Evidence suggests adolescent self-esteem is influenced by beliefs of how individuals in their reference group perceive them. However, few studies examine how gender- and violence-related social norms affect self-esteem among refugee populations. This paper explores relationships between gender inequitable and victim-blaming social norms, personal attitudes, and self-esteem among adolescent girls participating in a life skills program in three Ethiopian refugee camps. METHODS: Ordinary least squares multivariable regression analysis was used to assess the associations between attitudes and social norms, and self-esteem. Key independent variables of interest included a scale measuring personal attitudes toward gender inequitable norms, a measure of perceived injunctive norms capturing how a girl believed her family and community would react if she was raped, and a peer-group measure of collective descriptive norms surrounding gender inequity. The key outcome variable, self-esteem, was measured using the Rosenberg self-esteem scale. RESULTS: Girl's personal attitudes toward gender inequitable norms were not significantly predictive of self-esteem at endline, when adjusting for other covariates. Collective peer norms surrounding the same gender inequitable statements were significantly predictive of self-esteem at endline (ß = -0.130; p  =  0.024). Additionally, perceived injunctive norms surrounding family and community-based sanctions for victims of forced sex were associated with a decline in self-esteem at endline (ß = -0.103; p  =  0.014). Significant findings for collective descriptive norms and injunctive norms remained when controlling for all three constructs simultaneously. CONCLUSIONS: Findings suggest shifting collective norms around gender inequity, particularly at the community and peer levels, may sustainably support the safety and well-being of adolescent girls in refugee settings
    corecore