3,905 research outputs found

    Malware Visualization and Similarity via Tracking Binary Execution Path

    Get PDF
    Today, computer systems are widely and importantly used throughout society, and malicious codes to take over the system and perform malicious actions are continuously being created and developed. These malicious codes are sometimes found in new forms, but in many cases they are modified from existing malicious codes. Since there are too many threatening malicious codes that are being continuously generated for human analysis, various studies to efficiently detect, classify, and analyze are essential. There are two main ways to analyze malicious code. First, static analysis is a technique to identify malicious behaviors by analyzing the structure of malicious codes or specific binary patterns at the code level. The second is a dynamic analysis technique that uses virtualization tools to build an environment in a virtual machine and executes malicious code to analyze malicious behavior. The method used to analyze malicious codes in this paper is a static analysis technique. Although there is a lot of information that can be obtained from dynamic analysis, there is a disadvantage that it can be analyzed normally only when the environment in which each malicious code is executed is matched. However, since the method proposed in this paper tracks and analyzes the execution stream of the code, static analysis is performed, but the effect of dynamic analysis can be expected.The core idea of this paper is to express the malicious code as a 25 25 pixel image using 25 API categories selected. The interaction and frequency of the API is made into a 25 25 pixel image based on a matrix using RGB values. When analyzing the malicious code, the Euclidean distance algorithm is applied to the generated image to measure the color similarity, and the similarity of the mutual malicious behavior is calculated based on the final Euclidean distance value. As a result, as a result of comparing the similarity calculated by the proposed method with the similarity calculated by the existing similarity calculation method, the similarity was calculated to be 5-10% higher on average. The method proposed in this study spends a lot of time deriving results because it analyzes, visualizes, and calculates the similarity of the visualized sample. Therefore, it takes a lot of time to analyze a huge number of malicious codes. A large amount of malware can be analyzed through follow-up studies, and improvements are needed to study the accuracy according to the size of the data set

    Análisis de la eficacia de la acupuntura en el tratamiento del síndrome de dolor miofascial de la musculatura masticotoria. Ensayo clínico controlado, aleatorizado, paralelo, controlado con placebo y ciego para el evaluador

    Full text link
    Tesis doctoral inédita leída en la Universidad Autónoma de Madrid, Facultad de Medicina, Departamento de Cirugía. Fecha de lectura: 23-02-2017Esta tesis tiene embargado el acceso al texto completo hasta el 23-08-2018Este estudio ha sido realizado con la ayuda del Fondo de Investigaciones Sanitarias (FIS) concedida por el Instituto de Salud Carlos III,Proyecto de Investigación 10/02857

    The Characteristics of Tip Leakage in Scroll Compressors for Air Conditioners

    Get PDF

    Fatigue Crack Length Estimation and Prediction using Trans-fitting with Support Vector Regression

    Get PDF
    A method is described in this paper for crack propagation prediction using only the initial crack length of the target specimen. The proposed method consists of two parts: (1) crack length estimation using support vector regression (SVR) and (2) crack length prediction using a new trans-fitting method. Features based on the filtered wave signals were defined and a model was constructed using the SVR method to estimate the crack length. The hyper-parameters of the SVR model were selected based on a grid search algorithm. Prediction of the crack length was based on the previous crack length, which was estimated based on the wave signals. In this step, a newly proposed trans-fitting method was applied. The proposed trans-fitting method updated the selected candidate function to translocate the trend of crack propagation based on the training dataset. By translocating the trends to the estimated crack length of the target specimen, the crack propagation could be predicted. The proposed method was validated by comparison with given specimens. The results show that the proposed method can estimate and predict the crack length accurately

    Neuroprotective effect of dexmedetomidine on autophagy in mice administered intracerebroventricular injections of Aβ25–35

    Get PDF
    Alzheimer’s disease (AD), one of the most prevalent neurodegenerative diseases is associated with pathological autophagy-lysosomal pathway dysfunction. Dexmedetomidine (Dex) has been suggested as an adjuvant to general anesthesia with advantages in reducing the incidence of postoperative cognitive dysfunction in Dex-treated patients with AD and older individuals. Several studies reported that Dex improved memory; however, evidence on the effects of Dex on neuronal autophagy dysfunction in the AD model is lacking. We hypothesized that Dex administration would have neuroprotective effects by improving pathological autophagy dysfunction in mice that received an intracerebroventricular (i.c.v.) injection of amyloid β-protein fragment 25–35 (Aβ25–35) and in an autophagy-deficient cellular model. In the Y-maze test, Dex reversed the decreased activity of Aβ25–35 mice. Additionally, it restored the levels of two memory-related proteins, phosphorylated Ca2+/calmodulin-dependent protein kinase II (p-CaMKII) and postsynaptic density-95 (PSD-95) in Aβ25–35 mice and organotypic hippocampal slice culture (OHSC) with Aβ25–35. Dex administration also resulted in decreased expression of the autophagy-related microtubule-associated proteins light chain 3-II (LC3-II), p62, lysosome-associated membrane protein2 (LAMP2), and cathepsin D in Aβ25–35 mice and OHSC with Aβ25–35. Increased numbers of co-localized puncta of LC3-LAMP2 or LC3-cathepsin D, along with dissociated LC3-p62 immunoreactivity following Dex treatment, were observed. These findings were consistent with the results of western blots and the transformation of double-membrane autophagosomes into single-membraned autolysosomes in ultrastructures. It was evident that Dex treatment alleviated impaired autolysosome formation in Aβ mice. Our study demonstrated the improvement of memory impairment caused by Dex and its neuroprotective mechanism by investigating the role of the autophagy-lysosomal pathway in a murine Aβ25–35 model. These findings suggest that Dex could be used as a potential neuroprotective adjuvant in general anesthesia to prevent cognitive decline

    Visible-ultraviolet spectroscopic ellipsometry of lead zirconate titanate thin films

    Get PDF
    We measured pseudodielectric functions in the visible-ultraviolet spectral range of Pb(ZrxTi1−x)O3 (x=0.2, 0.56, 0.82) (PZT)grown on platinized silicon substrate using the sol-gel method and also on (0001) sapphire using radio frequency sputtering method. Using a parametric optical constant model, we estimated the dielectric functions of the PZTthin films. Taking the second derivative of the fitted layer dielectric functions and using the standard critical point model, we determined the parameters of the critical points. In the second derivative spectra, the lowest bandgap energy peak near 4eV is fitted as a double peak for annealedPZTs associated with the perovskite phase. As-grown PZTs have mainly pyrochlore phase and the lowest bandgap is fitted as a single peak. We compared the bandgap energies with literature values
    corecore