329 research outputs found

    An analysis of advanced training courses beyond the requirements of STCW and applications in Myanmar

    Get PDF

    Design and Optimization of Aircraft Configuration for Minimum Drag

    Get PDF
    This paper presents a reliable and robust optimization for minimum drag of an aircraft at the conceptual design phase. Firstly, the conceptual design code was developed and existing Single Seat Aerobatic (SSA) aircraft was chosen to validate the reliability of developed code. The resulted data from the developed code showed good agreement with the existing data. Secondly, Sequential Quadratic Programming (SQP) optimizer was created and employed as a tool to explore possible aircraft configurations that are more efficient and less costly than an existing design. The optimized results gave lower Drag and better performance

    Privacy-preserving pandemic monitoring

    Get PDF

    Fabrication and characterization of planar hall devices

    Get PDF
    Master'sMASTER OF ENGINEERIN

    Detection of Phishing Websites using Generative Adversarial Network

    Get PDF
    Phishing is typically deployed as an attack vector in the initial stages of a hacking endeavour. Due to it low-risk rightreward nature it has seen a widespread adoption, and detecting it has become a challenge in recent times. This paper proposes a novel means of detecting phishing websites using a Generative Adversarial Network. Taking into account the internal structure and external metadata of a website, the proposed approach uses a generator network which generates both legitimate as well as synthetic phishing features to train a discriminator network. The latter then determines if the features are either normal or phishing websites, before improving its detection accuracy based on the classification error. The proposed approach is evaluated using two different phishing datasets and is found to achieve a detection accuracy of up to 94%

    Validated Liquid Culture Monitoring System for Lifespan Extension of Caenorhabditis elegans through Genetic and Dietary Manipulations

    Get PDF
    13301甲第3930号博士(医学)金沢大学博士論文本文Full 以下に掲載:Aging and Disease 4(4) pp.178-185 2013. 共著者:Myat Thu Thu Win, Yasuhiko Yamamoto, Seiichi Munesue, Dong Han, Shin-ichi Harada, Hiroshi Yamamot

    Validated Liquid Culture Monitoring System for Lifespan Extension of Caenorhabditis elegans through Genetic and Dietary Manipulations

    Get PDF
    13301甲第3930号博士(医学)金沢大学博士論文要旨Abstract 以下に掲載:Aging and Disease. 4(4) pp.178-185 2013. 共著者:Myat Thu Thu Win, Yasuhiko Yamamoto, Seiichi Munesue, Dong Han, Shin-ichi Harada, Hiroshi Yamamot

    PROTECT: container process isolation using system call interception

    Get PDF
    Virtualization is the underpinning technology enabling cloud computing service provisioning, and container-based virtualization provides an efficient sharing of the underlying host kernel libraries amongst multiple guests. While there has been research on protecting the host against compromise by malicious guests, research on protecting the guests against a compromised host is limited. In this paper, we present an access control solution which prevents the host from gaining access into the guest containers and their data. Using system call interception together with the built-in AppArmor mandatory access control (MAC) approach the solution protects guest containers from a malicious host attempting to compromise the integrity of data stored therein. Evaluation of results have shown that it can effectively prevent hostile access from host to guest containers while ensuring minimal performance overhead

    QoS-aware Traffic Management in Software Defined Networking

    Get PDF
    Software defined networking (SDN) provides effective traffic management solution by separating control and data planes, global centralization control, and being programmable. And, the traditional shortest path routing cannot provide effective traffic engineering because it only aware shortest path. The constraint-aware routing is more efficient than the traditional shortest path routing, however, it needed to estimate constraints such as link capacity, delay, jitter, and so on and it cannot guarantee the future traffic demands. This paper proposed QoS-aware traffic management method in SDN to guarantee the QoS-aware traffic by selecting the optimal path based on the estimated constraints. First, the proposed traffic management method categorized traffic classes: QoS-aware traffic and non QoS-aware traffic classes. Then, the proposed method estimated the QoS parameters and calculated the optimal path based on the estimated parameters. Finally, the QoS-aware traffic routed with the optimal path and non QoS-aware traffic simply routed through the shortest path. The proposed method is validated by using network emulator, Mininet and SDN controller, ONOS. The experiment results of throughput and packet loss show that our proposed method outperformed the other two traffic management methods

    Direct Keyboard Mapping (DKM) Layout for Myanmar Fingerspelling Text Input -Study with Developed Fingerspelling Font "mmFingerspelling.ttf" -

    Get PDF
    corecore