166 research outputs found

    Snoop-forge-replay attack on continuous verification with keystrokes

    Get PDF
    We present a new attack called the snoop-forge-replay attack on the keystroke-based continuous verification systems. We performed the attacks on two levels – 1) feature-level and 2) sample-level. (1) Feature-level attack targets specific keystroke-based continuous verification method or system. In feature-level attacks, we performed a series of experiments using keystroke data from 50 users who typed approximately 1200 to 2300 keystrokes of free text during three different periods. The experiments consisted of two parts. In the first part, we conducted zero-effort verification experiments with two verifiers ( R and S ) and obtained Equal Error Rates (EERs) between 10% and 15% under various verifier configurations. In the second part, we replayed 10,000 forged impostor attempts per user and demonstrated how the zero-effort impostor pass rates became meaningless when impostor attempts were created using stolen keystroke timing information. (2) Sample-level attack is not specific to any particular keystroke-based continuous verification method or system. It can be launched with easily available keyloggers and application programming interfaces (APIs) for keystroke synthesis. Our results from 2640 experiments show that (i) the snoop-forge-replay attacks achieve alarmingly high error rates compared to zero-effort impostor attacks, which have been the de facto standard for evaluating keystroke-based continuous verification systems; (ii) four state-of-the-art verification methods, three types of keystroke latencies, and eleven matching-pair settings (–a key parameter in continuous verification with keystrokes) that we examined in this dissertation were susceptible to the attack; (iii) the attack is effective even when as low as 20 to 100 keystrokes were snooped to create forgeries. In light of our results, we question the security offered by the current keystroke-based continuous verification systems. Additionally, in our experiments, we harnessed virtualization technology to generate thousands of keystroke forgeries within a short time span. We point out that virtualization setup such as the one used in our experiments can also be exploited by an attacker to scale and speed up the attack

    Ensuring Victims’ Participation in the Criminal Justice of Bangladesh

    Get PDF
    It is seen that if the main actors in a criminal justice framework are to be identified, the most commonly identified would be the alleged, his legal representative, the prosecutor and the judge. In our current legal system, the victim appears to be one of the overlooked and disregarded parties, when in reality they should be considered a vital stakeholder in the criminal justice process to secure justice. Due to adversarial legal system in Bangladesh the burden of proof lies upon the prosecution or victim in a criminal proceeding. There is hence no comprehensive law securing rights and participation of victims in criminal justice system though few supports exist for them. In accessing the justice system, victims face numerous challenges and the plight of crime victims continues to go from bad to worse. In this background, the research relies on qualitative methods to explore their status, participation and challenges in the justice system and lastly recommends how to make the justice system victim oriented

    Focus on Domestic Violence in Bangladesh: A Study from Criminological Perspectives

    Get PDF
    Bangladesh is a patriarchal society where powerlessness and vulnerability are associated with women’s lives, as they are often found in positions where they are dominated and subjugated by men. Women are often controlled by their father, husband and son at different phases of their lives, and due to this reason a woman commonly has risk of experiencing domestic violence within her family. Though Bangladesh is experiencing a relatively high level of gender equality for South Asia, it is still not very surprising that a husband is more likely to assault and/or batter his educated/financially solvent wife if she fails to meet his demands or to perform household work. Domestic violence often takes place in form of physical aggression or threats, sexual and emotional abuse, stalking, passive/covert abuse, and economic deprivations. There have been many studies investigating the social and cultural reasoning of such heinous behaviour and crimes in Bangladesh. This paper focuses on criminological perspectives (e.g. individual personalities, socialisation, moral upbringings, and drug addiction of male partner) in addition to the feminist theory of domestic violence. These variables work together to conceptualise domestic violence. Theory integration has been used to amalgamate a number of relevant theories to gain a more eclectic and broad understanding of this phenomenon. Hence, in this study, all the relevant factors and aspects of criminological theories of domestic violence have been analysed and put in context to Bangladesh. The methodology includes a wide literature review on the issue of domestic violence and a survey with victims and perpetrators. The study reveals the continuing persistence of misogynistic gender roles in the society and the dominance of men over women in an abusive and subjugated manner that ultimately results in domestic violence. Additionally, results suggest that for households where abuse occurs and children are present, the children grow up having this violence ingrained and normalized due to the modelling of family members

    Effects of Violent Video/Computer Games

    Get PDF
    The research topic for this paper presented hereby is on the topic titled The effects of violent video computer games My research paper basically focuses on the effects of playing violent video or computer games For my research I also gathered primary and secondary data which shows the positive and negative effects of playing violent computer game

    Transfer Learning with Deep Convolutional Neural Network (CNN) for Pneumonia Detection using Chest X-ray

    Get PDF
    Pneumonia is a life-threatening disease, which occurs in the lungs caused by either bacterial or viral infection. It can be life-endangering if not acted upon in the right time and thus an early diagnosis of pneumonia is vital. The aim of this paper is to automatically detect bacterial and viral pneumonia using digital x-ray images. It provides a detailed report on advances made in making accurate detection of pneumonia and then presents the methodology adopted by the authors. Four different pre-trained deep Convolutional Neural Network (CNN)- AlexNet, ResNet18, DenseNet201, and SqueezeNet were used for transfer learning. 5247 Bacterial, viral and normal chest x-rays images underwent preprocessing techniques and the modified images were trained for the transfer learning based classification task. In this work, the authors have reported three schemes of classifications: normal vs pneumonia, bacterial vs viral pneumonia and normal, bacterial and viral pneumonia. The classification accuracy of normal and pneumonia images, bacterial and viral pneumonia images, and normal, bacterial and viral pneumonia were 98%, 95%, and 93.3% respectively. This is the highest accuracy in any scheme than the accuracies reported in the literature. Therefore, the proposed study can be useful in faster-diagnosing pneumonia by the radiologist and can help in the fast airport screening of pneumonia patients.Comment: 13 Figures, 5 tables. arXiv admin note: text overlap with arXiv:2003.1314

    Analizando la Masculinidad desde la Óptica Teórica y Buscando Vínculos con la Violencia de Género

    Get PDF
    In recent years, masculinity has become an imperative and influential academic discourse in the domain of gender studies. Despite having been explained and theorised from a number of perspectives, it lacks overall clarity and vary widely across different social and cultural contexts. Keeping that perspective in mind, this study drawing a rigorous review of the literature and reflexive analysis has synthesized prominent and pertinent theoretical issues concerning masculinity with the objective of having a succinct as well as methodical understanding of masculinity. This study also aims at developing the linkage between masculinity and violence against women. Despite being viewed as a cause of violence against women; theoretical notions of masculinity and its relation with violence against women remain largely understudied. Overall, the findings of the study confirm that masculinity as a concept is expressed through certain socially accepted ideologies and practices and there are at least three major theoretical developments concerning masculinity. When applied, each of these theories can individually stand as a reason for violence against women. The nexus between masculinity and violence against women is very proximate, and masculinity appears to be a very dominating force for perpetuating violence against women. Nonetheless, further wider empirical studies on masculinity and its relation to violence against women can draw new insights on the issues and enrich the gender studies discipline.En los últimos años, la masculinidad se ha convertido en un importante e influyente discurso académico en el campo de los estudios de género. A pesar de haber sido explicado y teorizado desde muchas perspectivas, carece de claridad general y varía ampliamente en diferentes contextos sociales y culturales. Teniendo esta perspectiva en mente, este estudio se basó en una revisión rigurosa de la literatura así como el análisis reflexivo sobre cuestiones teóricas importantes y pertinentes relativas a la masculinidad con el objetivo de tener una comprensión clara y metódica de la masculinidad. Este estudio también tiene como objetivo profundizar sobre el vínculo entre la masculinidad y la violencia contra las mujeres. A pesar de ser vista como una causa de violencia contra las mujeres; las nociones teóricas de la masculinidad y su relación con la violencia contra las mujeres siguen siendo ampliamente estudiadas. En conjunto, los resultados del estudio confirman que la masculinidad como concepto se expresa a través de ciertas ideologías y prácticas socialmente aceptadas y hay por lo menos tres desarrollos teóricos importantes concernientes a la masculinidad. Cuando se aplican, cada una de estas teorías puede ser individualmente una razón para la violencia contra las mujeres. El nexo entre la masculinidad y la violencia contra las mujeres es muy próximo y la masculinidad parece ser una fuerza muy dominante para perpetuar la violencia contra las mujeres. Sin embargo, otros estudios empíricos más amplios sobre la masculinidad y su relación con la violencia contra las mujeres pueden traer nuevas aportaciones al tema

    Environmental Effects on Germination and Seedling Emergence of Weedy Rice

    Get PDF
    The objective of this study is to determine the germination and growth of weedy rice seedlings that were grown under four different environmental conditions simulated in either growth chamber or room conditions. Photoperiod (24 h light, 24 h dark, 12 h light-dark), drought (0, 5, 10, 20 %) and temperature (25, 30, 35, 40 °C) effects were tested in growth chamber while the flooding depth (0, 2.5, 5, 10 cm) effects was tested in room condition. Germination percentage was not significantly affected (p > 0.05) by either of the environmental factors except for flooding depth at 10 cm. Temperature treatment specifically at 30 °C showed a pronounced effect on hypocotyl length, radicle length and root-shoot ratio compared to other temperature range. Highest hypocotyl length and root-shoot ratio were recorded in 10 % drought treatment and longest radicle length obtained in control treatment. Meanwhile, a continuous dark condition in photoperiod treatment showed the highest hypocotyl length in comparison to 24 hours of light and alternate 12 hours of light and dark. Highest radicle length and root-shoot ratio were obtained in 24 hours of light and 12 hours alternate light and dark respectively. Growth of weedy rice exhibited a declining trend in increasing flooding depth. The result of this study suggests that germination was retarded by deep flooding. Temperature and flooding depth affects the vegetative growth of weedy rice the most and sustained growth was observed at higher temperature regime. The information gained from this study may be useful in assessing the growth performance of weedy rice in relation to cultivated rice, and further helps in developing effective Malaysian weedy rice control strategies

    A hybrid multi objective cellular spotted hyena optimizer for wellbore trajectory optimization

    Get PDF
    Cost and safety are critical factors in the oil and gas industry for optimizing wellbore trajectory, which is a constrained and nonlinear optimization problem. In this work, the wellbore trajectory is optimized using the true measured depth, well profile energy, and torque. Numerous metaheuristic algorithms were employed to optimize these objectives by tuning 17 constrained variables, with notable drawbacks including decreased exploitation/exploration capability, local optima trapping, non-uniform distribution of non-dominated solutions, and inability to track isolated minima. The purpose of this work is to propose a modified multi-objective cellular spotted hyena algorithm (MOCSHOPSO) for optimizing true measured depth, well profile energy, and torque. To overcome the aforementioned difficulties, the modification incorporates cellular automata (CA) and particle swarm optimization (PSO). By adding CA, the SHO\u27s exploration phase is enhanced, and the SHO\u27s hunting mechanisms are modified with PSO\u27s velocity update property. Several geophysical and operational constraints have been utilized during trajectory optimization and data has been collected from the Gulf of Suez oil field. The proposed algorithm was compared with the standard methods (MOCPSO, MOSHO, MOCGWO) and observed significant improvements in terms of better distribution of non-dominated solutions, better-searching capability, a minimum number of isolated minima, and better Pareto optimal front. These significant improvements were validated by analysing the algorithms in terms of some statistical analysis, such as IGD, MS, SP, and ER. The proposed algorithm has obtained the lowest values in IGD, SP and ER, on the other side highest values in MS. Finally, an adaptive neighbourhood mechanism has been proposed which showed better performance than the fixed neighbourhood topology such as L5, L9, C9, C13, C21, and C25. Hopefully, this newly proposed modified algorithm will pave the way for better wellbore trajectory optimization
    • …
    corecore