2,240 research outputs found

    Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey

    Full text link
    Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc. To combat the threat/attacks from the malwares, anti- malwares have been developed. The existing anti-malwares are mostly based on the assumption that the malware structure does not changes appreciably. But the recent advancement in second generation malwares can create variants and hence posed a challenge to anti-malwares developers. To combat the threat/attacks from the second generation malwares with low false alarm we present our survey on malwares and its detection techniques.Comment: 5 Page

    A Novel Approach to Distributed Multi-Class SVM

    Full text link
    With data sizes constantly expanding, and with classical machine learning algorithms that analyze such data requiring larger and larger amounts of computation time and storage space, the need to distribute computation and memory requirements among several computers has become apparent. Although substantial work has been done in developing distributed binary SVM algorithms and multi-class SVM algorithms individually, the field of multi-class distributed SVMs remains largely unexplored. This research proposes a novel algorithm that implements the Support Vector Machine over a multi-class dataset and is efficient in a distributed environment (here, Hadoop). The idea is to divide the dataset into half recursively and thus compute the optimal Support Vector Machine for this half during the training phase, much like a divide and conquer approach. While testing, this structure has been effectively exploited to significantly reduce the prediction time. Our algorithm has shown better computation time during the prediction phase than the traditional sequential SVM methods (One vs. One, One vs. Rest) and out-performs them as the size of the dataset grows. This approach also classifies the data with higher accuracy than the traditional multi-class algorithms.Comment: 8 Page

    Distributed Multi Class SVM for Large Data Sets

    Full text link
    Data mining algorithms are originally designed by assuming the data is available at one centralized site.These algorithms also assume that the whole data is fit into main memory while running the algorithm. But in today's scenario the data has to be handled is distributed even geographically. Bringing the data into a centralized site is a bottleneck in terms of the bandwidth when compared with the size of the data. In this paper for multiclass SVM we propose an algorithm which builds a global SVM model by merging the local SVMs using a distributed approach(DSVM). And the global SVM will be communicated to each site and made it available for further classification. The experimental analysis has shown promising results with better accuracy when compared with both the centralized and ensemble method. The time complexity is also reduced drastically because of the parallel construction of local SVMs. The experiments are conducted by considering the data sets of size 100s to hundred of 100s which also addresses the issue of scalability.Comment: Presente in the WCI, Kochi, India, 201

    Phase transition and scaling behavior of topological charged black holes in Horava-Lifshitz gravity

    Full text link
    Gravity can be thought as an emergent phenomenon and it has a nice "thermodynamic" structure. In this context, it is then possible to study the thermodynamics without knowing the details of the underlying microscopic degrees of freedom. Here, based on the ordinary thermodynamics, we investigate the phase transition of the static, spherically symmetric charged black hole solution with arbitrary scalar curvature 2k2k in Ho\v{r}ava-Lifshitz gravity at the Lifshitz point z=3z=3. The analysis is done using the canonical ensemble frame work; i.e. the charge is kept fixed. We find (a) for both k=0k=0 and k=1k=1, there is no phase transition, (b) while k=1k=-1 case exhibits the second order phase transition within the {\it physical region} of the black hole. The critical point of second order phase transition is obtained by the divergence of the heat capacity at constant charge. Near the critical point, we find the various critical exponents. It is also observed that they satisfy the usual thermodynamic scaling laws.Comment: Minor corrections, refs. added, to appear in Class. Quant. Grav. arXiv admin note: text overlap with arXiv:1111.0973 by other author

    Rancang Bangun Website Pendataan Himpunan Mahasiswa Seruyan Berbasis SMS Broadcast

    Full text link
    Seruyan student association is one of student organization in Palangka Raya. It isfound that information of Seruyan students lacks enough data. It becomes a problem for theofficer since the officer has to come every campus, boarding house or house to complete thedata manually. It consumes too much time to collect and process the data. This designedwebsite is hoped can help the officer collecting, managing, and informing those students'data easily. It is hoped that this website which is developed using SMS Broadcast can be veryhelpful in speed and quality for presenting the information. This kind of website also offer astructured storage. Besides, available information then can be accessed in an unlimitednumber of times and places.This research is conducted using PHP language programme and MySQL database. Theresearcher also uses a methodology of software development which known as waterfallmethodology (Analysis, Design, Code, Testing and Maintenance). Besides, ContentManagement System (CMS) is also used to manage content of the website includes commandto add, change, and delete data which can be accessed from the administrator system page.This website is tested using whitebox technique which also includes a test for visitor,member, administrator, and browser. In the other opportunity in the future, it is hoped thatthis website can be developed bu adding some other features such as discussion forum orchat room

    A Comparative Note on Tunneling in AdS and in its Boundary Matrix Dual

    Full text link
    For charged black hole, within the grand canonical ensemble, the decay rate from thermal AdS to the black hole at a fixed high temperature increases with the chemical potential. We check that this feature is well captured by a phenomenological matrix model expected to describe its strongly coupled dual. This comparison is made by explicitly constructing the kink and bounce solutions around the de-confinement transition and evaluating the matrix model effective potential on the solutions.Comment: 1+12 pages, 9 figure
    corecore