114 research outputs found

    Challenges of hidden data in the unused area two within executable files

    Get PDF
    Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process

    Optimizing security and flexibility by designing a high security system for e-government servers

    Get PDF
    E-government is one of the most popular applications in the Web base applications.It helps people to do those work online, access the government sites, apply for online jobs, access to important data from the government database, and on top of that it also helps the government employees to access cameras and sensors over the country. However there are many challenges to keep the government data safe and secure in an open environment (network).Therefore, this paper is proposed to discuss two issues.In the first stage how to keep the data in safe, where this paper introduces many applications that guarantee a very high security for accessing and editing of data.The paper also carries a new design for E-government servers in which the authors try to distribute the security service on each line to avoid any attack from out or inside. The second issue is to ensure the flexibility of the data flow from the servers to the user which is the second challenge in the design.The experiment shows a good expected result, with the new approach have a high security and at the same time flexible E-government access.This paper provides a different view and uses a mixture of technologies to achieve a high security rate that will not affect different user's access.E-Government environment is subject to multiple security challenges, thus this paper proposed a model on how to secure the servers and how to ensure the flexibility of the system, in a simple way balance between a lot of security tools and the appreciate protecting vs. granting the flexible data flow up and download to the user

    New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique

    Get PDF
    The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. The strength of the hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) in an execution file (EXE) without change the size of execution file. The new proposed system is able to embed information in an execution file without change the size of execution file. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file

    Public Sentiment Analysis and Topic Modeling Regarding COVID-19’s Three Waves of Total Lockdown: A Case Study on Movement Control Order in Malaysia

    Get PDF
    [Abstract] The COVID-19 pandemic has affected many aspects of human life. The pandemic not only caused millions of fatalities and problems but also changed public sentiment and behavior. Owing to the magnitude of this pandemic, governments worldwide adopted full lockdown measures that attracted much discussion on social media platforms. To investigate the effects of these lockdown measures, this study performed sentiment analysis and latent Dirichlet allocation topic modeling on textual data from Twitter published during the three lockdown waves in Malaysia between 2020 and 2021. Three lockdown measures were identified, the related data for the first two weeks of each lockdown were collected and analysed to understand the public sentiment. The changes between these lockdowns were identified, and the latent topics were highlighted. Most of the public sentiment focused on the first lockdown as reflected in the large number of latent topics generated during this period. The overall sentiment for each lockdown was mostly positive, followed by neutral and then negative. Topic modelling results identified staying at home, quarantine and lockdown as the main aspects of discussion for the first lockdown, whilst importance of health measures and government efforts were the main aspects for the second and third lockdowns. Governments may utilise these findings to understand public sentiment and to formulate precautionary measures that can assure the safety of their citizens and tend to their most pressing problems. These results also highlight the importance of positive messaging during difficult times, establishing digital interventions and formulating new policies to improve the reaction of the public to emergency situations.Taiwan. Ministry of Science and Technology; 108-2511-H-224-007-MY

    Measurement of the branching ratio Γ(Λb⁰ → ψ(2S)Λ0)/Γ(Λb⁰ → J/ψΛ0) with the ATLAS detector

    Get PDF
    An observation of the Λb0→ψ(2S)Λ0\Lambda_b^0 \rightarrow \psi(2S) \Lambda^0 decay and a comparison of its branching fraction with that of the Λb0→J/ψΛ0\Lambda_b^0 \rightarrow J/\psi \Lambda^0 decay has been made with the ATLAS detector in proton--proton collisions at s=8 \sqrt{s}=8\,TeV at the LHC using an integrated luminosity of 20.6 20.6\,fb−1^{-1}. The J/ψJ/\psi and ψ(2S)\psi(2S) mesons are reconstructed in their decays to a muon pair, while the Λ0→pπ−\Lambda^0\rightarrow p\pi^- decay is exploited for the Λ0\Lambda^0 baryon reconstruction. The Λb0\Lambda_b^0 baryons are reconstructed with transverse momentum pT>10 p_{\rm T}>10\,GeV and pseudorapidity ∣η∣<2.1|\eta|<2.1. The measured branching ratio of the Λb0→ψ(2S)Λ0\Lambda_b^0 \rightarrow \psi(2S) \Lambda^0 and Λb0→J/ψΛ0\Lambda_b^0 \rightarrow J/\psi \Lambda^0 decays is Γ(Λb0→ψ(2S)Λ0)/Γ(Λb0→J/ψΛ0)=0.501±0.033(stat)±0.019(syst)\Gamma(\Lambda_b^0 \rightarrow \psi(2S)\Lambda^0)/\Gamma(\Lambda_b^0 \rightarrow J/\psi\Lambda^0) = 0.501\pm 0.033 ({\rm stat})\pm 0.019({\rm syst}), lower than the expectation from the covariant quark model.Comment: 12 pages plus author list (28 pages total), 5 figures, 1 table, published on Physics Letters B 751 (2015) 63-80. All figures are available at https://atlas.web.cern.ch/Atlas/GROUPS/PHYSICS/PAPERS/BPHY-2013-08

    Measurement of the View the tt production cross-section using eÎŒ events with b-tagged jets in pp collisions at √s = 13 TeV with the ATLAS detector

    Get PDF
    This paper describes a measurement of the inclusive top quark pair production cross-section (σttÂŻ) with a data sample of 3.2 fb−1 of proton–proton collisions at a centre-of-mass energy of √s = 13 TeV, collected in 2015 by the ATLAS detector at the LHC. This measurement uses events with an opposite-charge electron–muon pair in the final state. Jets containing b-quarks are tagged using an algorithm based on track impact parameters and reconstructed secondary vertices. The numbers of events with exactly one and exactly two b-tagged jets are counted and used to determine simultaneously σttÂŻ and the efficiency to reconstruct and b-tag a jet from a top quark decay, thereby minimising the associated systematic uncertainties. The cross-section is measured to be: σttÂŻ = 818 ± 8 (stat) ± 27 (syst) ± 19 (lumi) ± 12 (beam) pb, where the four uncertainties arise from data statistics, experimental and theoretical systematic effects, the integrated luminosity and the LHC beam energy, giving a total relative uncertainty of 4.4%. The result is consistent with theoretical QCD calculations at next-to-next-to-leading order. A fiducial measurement corresponding to the experimental acceptance of the leptons is also presented

    Search for strong gravity in multijet final states produced in pp collisions at √s=13 TeV using the ATLAS detector at the LHC

    Get PDF
    A search is conducted for new physics in multijet final states using 3.6 inverse femtobarns of data from proton-proton collisions at √s = 13TeV taken at the CERN Large Hadron Collider with the ATLAS detector. Events are selected containing at least three jets with scalar sum of jet transverse momenta (HT) greater than 1TeV. No excess is seen at large HT and limits are presented on new physics: models which produce final states containing at least three jets and having cross sections larger than 1.6 fb with HT > 5.8 TeV are excluded. Limits are also given in terms of new physics models of strong gravity that hypothesize additional space-time dimensions

    Measurement of the correlation between flow harmonics of different order in lead-lead collisions at √sNN = 2.76 TeV with the ATLAS detector

    Get PDF
    Correlations between the elliptic or triangular flow coefficients vm (m=2 or 3) and other flow harmonics vn (n=2 to 5) are measured using √sNN=2.76 TeV Pb+Pb collision data collected in 2010 by the ATLAS experiment at the LHC, corresponding to an integrated luminosity of 7 ÎŒb−1. The vm−vn correlations are measured in midrapidity as a function of centrality, and, for events within the same centrality interval, as a function of event ellipticity or triangularity defined in a forward rapidity region. For events within the same centrality interval, v3 is found to be anticorrelated with v2 and this anticorrelation is consistent with similar anticorrelations between the corresponding eccentricities, Δ2 and Δ3. However, it is observed that v4 increases strongly with v2, and v5 increases strongly with both v2 and v3. The trend and strength of the vm−vn correlations for n=4 and 5 are found to disagree with Δm−Δn correlations predicted by initial-geometry models. Instead, these correlations are found to be consistent with the combined effects of a linear contribution to vn and a nonlinear term that is a function of v22 or of v2v3, as predicted by hydrodynamic models. A simple two-component fit is used to separate these two contributions. The extracted linear and nonlinear contributions to v4 and v5 are found to be consistent with previously measured event-plane correlations

    Search for H→γγ produced in association with top quarks and constraints on the Yukawa coupling between the top quark and the Higgs boson using data taken at 7 TeV and 8 TeV with the ATLAS detector

    Get PDF
    A search is performed for Higgs bosons produced in association with top quarks using the diphoton decay mode of the Higgs boson. Selection requirements are optimized separately for leptonic and fully hadronic final states from the top quark decays. The dataset used corresponds to an integrated luminosity of 4.5 fb−14.5 fb−1 of proton–proton collisions at a center-of-mass energy of 7 TeV and 20.3 fb−1 at 8 TeV recorded by the ATLAS detector at the CERN Large Hadron Collider. No significant excess over the background prediction is observed and upper limits are set on the tt¯H production cross section. The observed exclusion upper limit at 95% confidence level is 6.7 times the predicted Standard Model cross section value. In addition, limits are set on the strength of the Yukawa coupling between the top quark and the Higgs boson, taking into account the dependence of the tt¯H and tH cross sections as well as the H→γγ branching fraction on the Yukawa coupling. Lower and upper limits at 95% confidence level are set at −1.3 and +8.0 times the Yukawa coupling strength in the Standard Model

    The performance of the jet trigger for the ATLAS detector during 2011 data taking

    Get PDF
    The performance of the jet trigger for the ATLAS detector at the LHC during the 2011 data taking period is described. During 2011 the LHC provided proton–proton collisions with a centre-of-mass energy of 7 TeV and heavy ion collisions with a 2.76 TeV per nucleon–nucleon collision energy. The ATLAS trigger is a three level system designed to reduce the rate of events from the 40 MHz nominal maximum bunch crossing rate to the approximate 400 Hz which can be written to offline storage. The ATLAS jet trigger is the primary means for the online selection of events containing jets. Events are accepted by the trigger if they contain one or more jets above some transverse energy threshold. During 2011 data taking the jet trigger was fully efficient for jets with transverse energy above 25 GeV for triggers seeded randomly at Level 1. For triggers which require a jet to be identified at each of the three trigger levels, full efficiency is reached for offline jets with transverse energy above 60 GeV. Jets reconstructed in the final trigger level and corresponding to offline jets with transverse energy greater than 60 GeV, are reconstructed with a resolution in transverse energy with respect to offline jets, of better than 4 % in the central region and better than 2.5 % in the forward direction
    • 

    corecore