967 research outputs found

    Network forensic Log analysis

    Get PDF
    Network forensics log analysis is the capturing, recording, and analysis of network events in order to discover the source of security attacks. An investigator needs to back up these recorded data to free up recording media and to preserve the data for future analysis. An investigator needs to perform network forensics process to determine which type of an attack over a network and to trace out the culprit. In the cyber-crime world huge log data, transactional data occurs which tends to plenty of data for storage and analyze them. It is difficult for forensic investigators to keep on playing with time and to find out the clues and analyze those collected data. In network forensic analysis, it involves network traces and detection of attacks. The trace involves an Intrusion Detection System and firewall logs, logs generated by network services and applications, packet captures. Network forensics is a branch of digital forensics that focuses on the monitoring and analysis of network traffic. Unlike other areas of digital forensics that focus on stored or static data, network forensics deals with volatile and dynamic data. It generally has two uses. The first, relating to security, involves detecting anomalous traffic and identifying intrusions. The second use, relating to law enforcement according to the chain of custody rule, involves capturing and Analyzing network traffic and can include tasks such as reassembling transferred files.“Stop, look and listen” systems, in which each packet is analysed in a rudimentary way in memory and only certain information saved for current analysis. On this analysis, we propose to archive data using various tools and provide a “unified structure” based on a standard forensic process. This different unified structured IDS data are use to store and preserve in a place, which would be use to present as an evidence in court by the forensic analysis. DOI: 10.17762/ijritcc2321-8169.15053

    Live Memory Forensic Analysis

    Get PDF
    The live memory image acquired in live forensics is always view in terms of integrity and reliability when presented as evidence. In this work, I describe how evidence like live memory obtained from physical memory image (RAM) and trustworthiness of evidence is studied. The evidence in live memory image can be taken as how accurately the memory image of RAM shows the real memory of the target machine. Based on a live memory analysis, investigator can test memory acquisition tool and after that live memory image is analyzed. Then, I describe the part of live memory analysis in the digital cyber forensics process and its use to address many challenges of the digital forensic investigation. In this work, I provide a method to overcome these problems. I highlight at some of the existing methods to live memory analysis. This work is done using acquisition and analysis tools. DOI: 10.17762/ijritcc2321-8169.15055

    Cor-pulmonale: a rare presentation in a case of middle lobe syndrome

    Get PDF
    Brock’s syndrome or middle lobe syndrome (MLS) is chronic or recurrent collapse of right middle lobe due to causes which may be obstructive or non obstructive. The pathogenesis is not completely understood. An expert committee of the world health organization defined cor pulmonale as hypertrophy of the right ventricle resulting from diseases affecting the function and/or structure of the lungs.” Cor pulmonale is a common heart disease and a leading cause of disability and death. We are reporting this association in a 65y old female who presented to the emergency with acute exacerbation of COPD with SpO2=64% room air. Chest X-ray and HRCT thorax showed features suggesting MLS and ECG shows features suggesting P pulmonale /right atrial enlargement. BNP too was elevated. Patient was resuscitated and put on mechanical ventilation after ABG showed respiratory acidosis. Appropriate treatment with bronchodilators and antibiotics was given

    Approximate information state based convergence analysis of recurrent Q-learning

    Full text link
    In spite of the large literature on reinforcement learning (RL) algorithms for partially observable Markov decision processes (POMDPs), a complete theoretical understanding is still lacking. In a partially observable setting, the history of data available to the agent increases over time so most practical algorithms either truncate the history to a finite window or compress it using a recurrent neural network leading to an agent state that is non-Markovian. In this paper, it is shown that in spite of the lack of the Markov property, recurrent Q-learning (RQL) converges in the tabular setting. Moreover, it is shown that the quality of the converged limit depends on the quality of the representation which is quantified in terms of what is known as an approximate information state (AIS). Based on this characterization of the approximation error, a variant of RQL with AIS losses is presented. This variant performs better than a strong baseline for RQL that does not use AIS losses. It is demonstrated that there is a strong correlation between the performance of RQL over time and the loss associated with the AIS representation.Comment: 25 pages, 6 figure

    A bibliometric review study of Michael Burawoy

    Get PDF
    This review article utilizes the technique of citation-based bibliometric analysis to provide a comprehensive understanding of the scholarly contributions made by sociologist Michael Burawoy. The most influential academic articles published by Burawoy were retrieved for analyses. Following this, scholars, journals and institutions that he most frequently collaborated with were traced. Further, country-wise analysis of his scholarship was carried out. Lastly, content analyses of retrieved articles identified prominent thematic domains in sociology to which Burawoy contributed, while temporal analyses helped to identify some emerging research hotspots. Findings reveal that historical and cultural context of Burawoy’s research mostly remained confined to the U.S.A., however, he significantly contributed towards the foundation of sociology in the Global South and studied the ensuing global power imbalances. Contemporary sociological thought remains indebted to Burawoy for his comparative study of industrial relations in the 21st century, and recently, his elaboration upon the need for public sociology has taken the discipline in new intellectual directions that appeals to a broader sociological community

    Botox and derma fillers: The twin-face of cosmetic dentistry

    Get PDF
    In recent years, botulinum toxin and derma fillers have made their way into dentistry for both dental esthetic and therapeutic uses. They are here to stay and with more and more intra oral uses of these materials, they are fast becoming an integral part of everyday dental practice. They provide most significant, minimally invasive procedure at low cost with limited to no recovery time. Today botox and derma fillers both go hand in hand for rejuvenative and cosmetic procedures. This article focuses on the mechanism of action and various uses of botox and derma fillers in the maxillofacial areas along with its future implications in the dentistry
    • …
    corecore