210 research outputs found

    A Performance Comparison between Enlightenment and Emulation in Microsoft Hyper-V

    Get PDF
    Microsoft MS Hyper-V is a native hypervisor that enables platform virtualization on x86-64 systems It is a microkernelized hypervisor where a host operating system provides the drivers for the hardware This approach leverages MS Hyper-V to support enlightenments the Microsoft name for Paravirtualization in addition to the hardware emulation virtualization technique This paper provides a quantitative performance comparison using different tests and scenarios between enlightened and emulated Virtual Machines VMs hosted by MS Hyper-V server 2012 The experimental results show that MS enlightenments improve performance by a factor of more than tw

    Anti- Forensics: The Tampering of Media

    Get PDF
    In the context of forensic investigations, the traditional understanding of evidence is changing where nowadays most prosecutors, lawyers and judges heavily rely on multimedia signs. This modern shift has allowed the law enforcement to better reconstruct the crime scenes or reveal the truth of any critical event.In this paper we shed the light on the role of video, audio and photos as forensic evidences presenting the possibility of their tampering by various easy-to-use, available anti-forensics softwares. We proved that along with the forensic analysis, digital processing, enhancement and authentication via forgery detection algorithms to testify the integrity of the content and the respective source of each, differentiating between an original and altered evidence is now feasible. These operations assist the court to attain higher degree of intelligibility of the multimedia data handled and assert the information retrieved from each that support the success of the investigation process

    RTS hypervisor qualification for real-time systems

    Get PDF
    Virtualization is a synonym for the server and cloud computing arena. Recently, it started to be also applied to real-time embedded systems with timing constraints. However, virtualization products for data centers and desktop computing cannot be readily applied to embedded systems because of differences in requirements, use cases, and computer architecture. Bridging the gap between virtualization and real-time requirements imposes the need of real-time virtualization products. Therefore, some embedded software manufacturers have built several real-time hypervisors specialized for embedded systems. Currently, there are several commercial ones such as Greenhills INTEGRITY MultiVisor, Real-Time Systems (RTS) GmbH Hypervisor, Tenasys eVM for Windows, National Instruments Real-Time Hyper Hypervisor, and some others. This paper provides the behavior and performance results of evaluating RTS hypervisor and gives advices of its use for soft or hard real-time embedded systems

    Real-time capabilities in the standard Linux Kernel: How to enable and use them?

    Get PDF
    Linux was originally designed as a general purpose operating system without consideration for real-time applications. Recently, it has become more attractive to the real-time community due to its low cost and open source approach. In order to help the real-time community, we will present in this paper the practical steps required to achieve a real-time Linux by applying the PREEMPT-RT patches which will provide Linux with these capabilities. We will also focus on some of the kernel configuration that should get attention while building the kernel in order to maintain the real-time behavior of the system during runtime. DOI: 10.17762/ijritcc2321-8169.15012

    Forensic Analysis of WhatsApp SQLite Databases on the Unrooted Android Phones

    Get PDF
    WhatsApp is the most popular instant messaging mobile application all over the world. Originally designed for simple and fast communication, however, its privacy features, such as end-to-end encryption, eased private and unobserved communication for criminals aiming to commit illegal acts. In this paper, a forensic analysis of the artefacts left by the encrypted WhatsApp SQLite databases on unrooted Android devices is presented. In order to provide a complete interpretation of the artefacts, a set of controlled experiments to generate these artefacts were performed. Once generated, their storage location and database structure on the device were identified. Since the data is stored in an encrypted SQLite database, its decryption is first discussed. Then, the methods of analyzing the artefacts are revealed, aiming to understand how they can be correlated to cover all the possible evidence. In the results obtained, it is shown how to reconstruct the list of contacts, the history of exchanged textual and non-textual messages, as well as the details of their contents. Furthermore, this paper shows how to determine the properties of both the broadcast and the group communications in which the user has been involved, as well as how to reconstruct the logs of the voice and video calls. Doi: 10.28991/HIJ-2022-03-02-06 Full Text: PD

    An Assessment of Students’ Preferences Using Social Media Platforms on Their Selection of Private Universities in Lebanon

    Get PDF
    This paper assesses the behavior of prospective students of private universities in Lebanon on social media platforms; classifies them according to the extent and the way they use these platforms, and investigates students’ preferences using social media to choose a private University. A quantitative approach was adopted using a structured questionnaire administered to a convenient sample of 527 students from private universities in Lebanon who responded willingly. Collected data were analyzed using the SPSS program employing descriptive statistics. The university sample consisted of six Lebanese Higher Education Institutions that belong to different socio-economic categories, diverse cultures, many geographic locations, and varying chronological seniority. Results showed the influence of university pages on these platforms on students’ decisions and their adoption as a primary source of information before making their choices. Universities were unsuccessful in providing an effective communication channel with students or enabling two-way communication and motivating participation in comments, content creation, sharing experiences related to the universities, or sharing posts from their pages. Authors recommend universities review their motivational schemes for students to interact on university platforms regarding access to information and communication. For marketing, it is necessary to hire qualified staff, and provide a consistent and updated policy

    VALPROIC ACID INDUCES APOPTOSIS AND INCREASES CXCR7 EXPRESSION IN EPITHELIAL OVARIAN CANCER CELL LINE SKOV-3.

    Get PDF
    Background: The chemokine receptor, CXCR7 is described to play a biologically relevant role in tumor growth and spread. Recently, it was reported that CXCR7 overexpression is associated with an unfavorable prognosis and metastatis of epithelial ovarian cancer (EOC). Aware that, several reports indicated that Histone deacetylases (HDACs) regulate the expression and activity of many proteins involved in both cancer initiation and progression, the aim of this work, was to study the effect of the HDAC inhibitor valproic acid (VPA) on the expression of CXCR7 as well as its impact on survival function in the epithelial ovarian cell line (SKOV-3). Methods: cells were cultured with varying concentrations of VPA (1, 2, 3, 4, 5 and 10 mM) for different durations (0, 12 h, 24 h and 48 h). Cell survival was assessed by Neutral red assay and by colony counting which being stained with crystal violet. CXCR7 expression was determined at mRNA level using quantitative real-time PCR (qRT-PCR) or at the protein level using western blotting. Results: VPA reduces cell survival of SKOV-3 cancer cells. The inhibition effect of VPA was dose and time-dependent. Exposure to VPA at concentrations above 2 mM at 24 h resulted in an increase expression of CXCR7 at both the mRNA and protein levels . Conclusion: These observations provide, for the first time, a better insight into the epigenetic mechanisms involved in regulating CXCR7 expression in EOC and will open new avenues for evaluating drugs that specifically stimulate the apoptosis of EOC with minimal unwanted side effect

    VALPROIC ACID INDUCES APOPTOSIS AND INCREASES CXCR7 EXPRESSION IN EPITHELIAL OVARIAN CANCER CELL LINE SKOV-3.

    Get PDF
    Background: The chemokine receptor, CXCR7 is described to play a biologically relevant role in tumor growth and spread. Recently, it was reported that CXCR7 overexpression is associated with an unfavorable prognosis and metastatis of epithelial ovarian cancer (EOC). Aware that, several reports indicated that Histone deacetylases (HDACs) regulate the expression and activity of many proteins involved in both cancer initiation and progression, the aim of this work, was to study the effect of the HDAC inhibitor valproic acid (VPA) on the expression of CXCR7 as well as its impact on survival function in the epithelial ovarian cell line (SKOV-3). Methods: cells were cultured with varying concentrations of VPA (1, 2, 3, 4, 5 and 10 mM) for different durations (0, 12 h, 24 h and 48 h). Cell survival was assessed by Neutral red assay and by colony counting which being stained with crystal violet. CXCR7 expression was determined at mRNA level using quantitative real-time PCR (qRT-PCR) or at the protein level using western blotting. Results: VPA reduces cell survival of SKOV-3 cancer cells. The inhibition effect of VPA was dose and time-dependent. Exposure to VPA at concentrations above 2 mM at 24 h resulted in an increase expression of CXCR7 at both the mRNA and protein levels . Conclusion: These observations provide, for the first time, a better insight into the epigenetic mechanisms involved in regulating CXCR7 expression in EOC and will open new avenues for evaluating drugs that specifically stimulate the apoptosis of EOC with minimal unwanted side effect

    Differentiation associated regulation of microRNA expression in vivo in human CD8+ T cell subsets

    Get PDF
    BACKGROUND: The differentiation of CD8+ T lymphocytes following priming of naïve cells is central in the establishment of the adaptive immune response. Yet, the molecular events underlying this process are not fully understood. MicroRNAs have been recently shown to play a key role in the regulation of haematopoiesis in mouse, but their implication in peripheral lymphocyte differentiation in humans remains largely unknown. METHODS: In order to explore the potential implication of microRNAs in CD8+ T cell differentiation in humans, microRNA expression profiles were analysed using microarrays and quantitative PCR in several human CD8+ T cell subsets defining the major steps of the T cell differentiation pathway. RESULTS: We found expression of a limited set of microRNAs, including the miR-17~92 cluster. Moreover, we reveal the existence of differentiation-associated regulation of specific microRNAs. When compared to naive cells, miR-21 and miR-155 were indeed found upregulated upon differentiation to effector cells, while expression of the miR-17~92 cluster tended to concomitantly decrease. CONCLUSIONS: This study establishes for the first time in a large panel of individuals the existence of differentiation associated regulation of microRNA expression in human CD8+ T lymphocytes in vivo, which is likely to impact on specific cellular functions
    corecore