2,240 research outputs found
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey
Malwares are big threat to digital world and evolving with high complexity.
It can penetrate networks, steal confidential information from computers, bring
down servers and can cripple infrastructures etc. To combat the threat/attacks
from the malwares, anti- malwares have been developed. The existing
anti-malwares are mostly based on the assumption that the malware structure
does not changes appreciably. But the recent advancement in second generation
malwares can create variants and hence posed a challenge to anti-malwares
developers. To combat the threat/attacks from the second generation malwares
with low false alarm we present our survey on malwares and its detection
techniques.Comment: 5 Page
A Novel Approach to Distributed Multi-Class SVM
With data sizes constantly expanding, and with classical machine learning
algorithms that analyze such data requiring larger and larger amounts of
computation time and storage space, the need to distribute computation and
memory requirements among several computers has become apparent. Although
substantial work has been done in developing distributed binary SVM algorithms
and multi-class SVM algorithms individually, the field of multi-class
distributed SVMs remains largely unexplored. This research proposes a novel
algorithm that implements the Support Vector Machine over a multi-class dataset
and is efficient in a distributed environment (here, Hadoop). The idea is to
divide the dataset into half recursively and thus compute the optimal Support
Vector Machine for this half during the training phase, much like a divide and
conquer approach. While testing, this structure has been effectively exploited
to significantly reduce the prediction time. Our algorithm has shown better
computation time during the prediction phase than the traditional sequential
SVM methods (One vs. One, One vs. Rest) and out-performs them as the size of
the dataset grows. This approach also classifies the data with higher accuracy
than the traditional multi-class algorithms.Comment: 8 Page
Distributed Multi Class SVM for Large Data Sets
Data mining algorithms are originally designed by assuming the data is
available at one centralized site.These algorithms also assume that the whole
data is fit into main memory while running the algorithm. But in today's
scenario the data has to be handled is distributed even geographically.
Bringing the data into a centralized site is a bottleneck in terms of the
bandwidth when compared with the size of the data. In this paper for multiclass
SVM we propose an algorithm which builds a global SVM model by merging the
local SVMs using a distributed approach(DSVM). And the global SVM will be
communicated to each site and made it available for further classification. The
experimental analysis has shown promising results with better accuracy when
compared with both the centralized and ensemble method. The time complexity is
also reduced drastically because of the parallel construction of local SVMs.
The experiments are conducted by considering the data sets of size 100s to
hundred of 100s which also addresses the issue of scalability.Comment: Presente in the WCI, Kochi, India, 201
Phase transition and scaling behavior of topological charged black holes in Horava-Lifshitz gravity
Gravity can be thought as an emergent phenomenon and it has a nice
"thermodynamic" structure. In this context, it is then possible to study the
thermodynamics without knowing the details of the underlying microscopic
degrees of freedom. Here, based on the ordinary thermodynamics, we investigate
the phase transition of the static, spherically symmetric charged black hole
solution with arbitrary scalar curvature  in Ho\v{r}ava-Lifshitz gravity at
the Lifshitz point . The analysis is done using the canonical ensemble
frame work; i.e. the charge is kept fixed. We find (a) for both  and
, there is no phase transition, (b) while  case exhibits the second
order phase transition within the {\it physical region} of the black hole. The
critical point of second order phase transition is obtained by the divergence
of the heat capacity at constant charge. Near the critical point, we find the
various critical exponents. It is also observed that they satisfy the usual
thermodynamic scaling laws.Comment: Minor corrections, refs. added, to appear in Class. Quant. Grav.
  arXiv admin note: text overlap with arXiv:1111.0973 by other author
Rancang Bangun Website Pendataan Himpunan Mahasiswa Seruyan Berbasis SMS Broadcast
Seruyan student association is one of student organization in Palangka Raya. It isfound that information of Seruyan students lacks enough data. It becomes a problem for theofficer since the officer has to come every campus, boarding house or house to complete thedata manually. It consumes too much time to collect and process the data. This designedwebsite is hoped can help the officer collecting, managing, and informing those students'data easily. It is hoped that this website which is developed using SMS Broadcast can be veryhelpful in speed and quality for presenting the information. This kind of website also offer astructured storage. Besides, available information then can be accessed in an unlimitednumber of times and places.This research is conducted using PHP language programme and MySQL database. Theresearcher also uses a methodology of software development which known as waterfallmethodology (Analysis, Design, Code, Testing and Maintenance). Besides, ContentManagement System (CMS) is also used to manage content of the website includes commandto add, change, and delete data which can be accessed from the administrator system page.This website is tested using whitebox technique which also includes a test for visitor,member, administrator, and browser. In the other opportunity in the future, it is hoped thatthis website can be developed bu adding some other features such as discussion forum orchat room
A Comparative Note on Tunneling in AdS and in its Boundary Matrix Dual
For charged black hole, within the grand canonical ensemble, the decay rate
from thermal AdS to the black hole at a fixed high temperature increases with
the chemical potential. We check that this feature is well captured by a
phenomenological matrix model expected to describe its strongly coupled dual.
This comparison is made by explicitly constructing the kink and bounce
solutions around the de-confinement transition and evaluating the matrix model
effective potential on the solutions.Comment: 1+12 pages, 9 figure
- …
