329 research outputs found
An analysis of advanced training courses beyond the requirements of STCW and applications in Myanmar
Design and Optimization of Aircraft Configuration for Minimum Drag
This paper presents a reliable and robust optimization for minimum drag of an aircraft at the conceptual design phase. Firstly, the conceptual design code was developed and existing Single Seat Aerobatic (SSA) aircraft was chosen to validate the reliability of developed code. The resulted data from the developed code showed good agreement with the existing data. Secondly, Sequential Quadratic Programming (SQP) optimizer was created and employed as a tool to explore possible aircraft configurations that are more efficient and less costly than an existing design. The optimized results gave lower Drag and better performance
Detection of Phishing Websites using Generative Adversarial Network
Phishing is typically deployed as an attack vector in the initial stages of a hacking endeavour. Due to it low-risk rightreward nature it has seen a widespread adoption, and detecting it has become a challenge in recent times. This paper proposes a novel means of detecting phishing websites using a Generative Adversarial Network. Taking into account the internal structure and external metadata of a website, the proposed approach uses a generator network which generates both legitimate as well as synthetic phishing features to train a discriminator network. The latter then determines if the features are either normal or phishing websites, before improving its detection accuracy based on the classification error. The proposed approach is evaluated using two different phishing datasets and is found to achieve a detection accuracy of up to 94%
Validated Liquid Culture Monitoring System for Lifespan Extension of Caenorhabditis elegans through Genetic and Dietary Manipulations
13301甲第3930号博士(医学)金沢大学博士論文本文Full 以下に掲載:Aging and Disease 4(4) pp.178-185 2013. 共著者:Myat Thu Thu Win, Yasuhiko Yamamoto, Seiichi Munesue, Dong Han, Shin-ichi Harada, Hiroshi Yamamot
Validated Liquid Culture Monitoring System for Lifespan Extension of Caenorhabditis elegans through Genetic and Dietary Manipulations
13301甲第3930号博士(医学)金沢大学博士論文要旨Abstract 以下に掲載:Aging and Disease. 4(4) pp.178-185 2013. 共著者:Myat Thu Thu Win, Yasuhiko Yamamoto, Seiichi Munesue, Dong Han, Shin-ichi Harada, Hiroshi Yamamot
PROTECT: container process isolation using system call interception
Virtualization is the underpinning technology enabling cloud computing service provisioning, and container-based virtualization provides an efficient sharing of the underlying host kernel libraries amongst multiple guests. While there has been research on protecting the host against compromise by malicious guests, research on protecting the guests against a compromised host is limited. In this paper, we present an access control solution which prevents the host from gaining access into the guest containers and their data. Using system call interception together with the built-in AppArmor mandatory access control (MAC) approach the solution protects guest containers from a malicious host attempting to compromise the integrity of data stored therein. Evaluation of results have shown that it can effectively prevent hostile access from host to guest containers while ensuring minimal performance overhead
QoS-aware Traffic Management in Software Defined Networking
Software defined networking (SDN) provides effective traffic management solution by separating control and data planes, global centralization control, and being programmable. And, the traditional shortest path routing cannot provide effective traffic engineering because it only aware shortest path. The constraint-aware routing is more efficient than the traditional shortest path routing, however, it needed to estimate constraints such as link capacity, delay, jitter, and so on and it cannot guarantee the future traffic demands. This paper proposed QoS-aware traffic management method in SDN to guarantee the QoS-aware traffic by selecting the optimal path based on the estimated constraints. First, the proposed traffic management method categorized traffic classes: QoS-aware traffic and non QoS-aware traffic classes. Then, the proposed method estimated the QoS parameters and calculated the optimal path based on the estimated parameters. Finally, the QoS-aware traffic routed with the optimal path and non QoS-aware traffic simply routed through the shortest path. The proposed method is validated by using network emulator, Mininet and SDN controller, ONOS. The experiment results of throughput and packet loss show that our proposed method outperformed the other two traffic management methods
- …