coding method
Recently Published Documents


TOTAL DOCUMENTS

919
(FIVE YEARS 170)

H-INDEX

24
(FIVE YEARS 5)

2022 ◽  
Author(s):  
Arash Mahboubi ◽  
Keyvan Ansari ◽  
Seyit Camtepe ◽  
Jarek Duda ◽  
Paweł Morawiecki ◽  
...  

Unwanted data encryption, such as ransomware attacks, continues to be a significant cybersecurity threat. Ransomware is a preferred weapon of cybercriminals who target small to large organizations' computer systems and data centres. It is malicious software that infects a victim's computer system and encrypts all its valuable data files. The victim needs to pay a ransom, often in cryptocurrency, in return for a decryption key. Many solutions use methods, including the inspection of file signatures, runtime process behaviors, API calls, and network traffic, to detect ransomware code. However, unwanted data encryption is still a top threat. This paper presents the first immunity solution, called the digital immunity module (DIM). DIM focuses on protecting valuable business-related data files from unwanted encryption rather than detecting malicious codes or processes. We show that methods such as file entropy and fuzzy hashing can be effectively used to sense unwanted encryption on a protected file, triggering our novel source coding method to paralyze the malicious manipulation of data such as ransomware encryption. Specifically, maliciously encrypted data blocks consume exponentially larger space and longer writing time on the DIM-protected file system. As a result, DIM creates enough time for system/human intervention and forensics analysis. Unlike the existing solutions, DIM protects the data regardless of ransomware families and variants. Additionally, DIM can defend against simultaneously active multiple ransomware, including the most recent hard to detect and stop fileless ones. We tested our solution on 39 ransomware families, including the most recent ransomware attacks. DIM successfully defended our sample file dataset (1335 pdf, jpg, and tiff files) against those ransomware attacks with zero file loss.


2022 ◽  
Author(s):  
Arash Mahboubi ◽  
Keyvan Ansari ◽  
Seyit Camtepe ◽  
Jarek Duda ◽  
Paweł Morawiecki ◽  
...  

Unwanted data encryption, such as ransomware attacks, continues to be a significant cybersecurity threat. Ransomware is a preferred weapon of cybercriminals who target small to large organizations' computer systems and data centres. It is malicious software that infects a victim's computer system and encrypts all its valuable data files. The victim needs to pay a ransom, often in cryptocurrency, in return for a decryption key. Many solutions use methods, including the inspection of file signatures, runtime process behaviors, API calls, and network traffic, to detect ransomware code. However, unwanted data encryption is still a top threat. This paper presents the first immunity solution, called the digital immunity module (DIM). DIM focuses on protecting valuable business-related data files from unwanted encryption rather than detecting malicious codes or processes. We show that methods such as file entropy and fuzzy hashing can be effectively used to sense unwanted encryption on a protected file, triggering our novel source coding method to paralyze the malicious manipulation of data such as ransomware encryption. Specifically, maliciously encrypted data blocks consume exponentially larger space and longer writing time on the DIM-protected file system. As a result, DIM creates enough time for system/human intervention and forensics analysis. Unlike the existing solutions, DIM protects the data regardless of ransomware families and variants. Additionally, DIM can defend against simultaneously active multiple ransomware, including the most recent hard to detect and stop fileless ones. We tested our solution on 39 ransomware families, including the most recent ransomware attacks. DIM successfully defended our sample file dataset (1335 pdf, jpg, and tiff files) against those ransomware attacks with zero file loss.


2021 ◽  
pp. 1-16
Author(s):  
Javad Alipour ◽  
Maryam Mohebi ◽  
Ali Roohani

Abstract We report on a conceptual replication of Révész (2012) in order to investigate the idea whether learners provided with recasts do engage in different kinds of behavioral engagement as a function of their working memory and if/how this engagement comes to bear on performance on different measures. Engagement with recasts was measured through a coding method categorizing responses to the recasts running the gamut from: (1) no opportunity, (2) opportunity, but did not repeat, (3) repeated the recasted form, (4) negotiated the response, to (5) used the recasted form later in the discourse. Consistent with Révész (2012), though with lower effect sizes, the results showed that recasts were most conducive to gains on an oral task and less so on a written description task, but non-effective on a grammaticality judgment task. Furthermore, it was revealed that learners with a high phonological short-term memory were more prone to recast-induced engagement on an oral production task, whereas those enjoying a higher reading span were considerably less so. We propose that learner engagement be deemed more important in future interaction research.


2021 ◽  
Vol 15 (1) ◽  
Author(s):  
Louise Kelly ◽  
Eissa Hashemi

This qualitative study explores the role of crucibles, life-triggering moments, parents’ life mottos and definitions of success, and holding values in the lives of authentic leaders. This research used the life-story approach to explore the experience of such concepts on authentic leaders. Self-identified leaders with more than five years of experience in a leadership position or in a role of managing and developing others were invited to this research. Qualified authentic leaders (between 65 to 80 in ALQ) were invited to a qualitative interview utilizing the life story approach to explore significant forming factors of their leadership qualities. An inductive coding method was used in analyzing the transcription of interviews. Significant themes and codes show that life-triggers, crucibles, parents’ life mottos, their definition of success, and holding values play a significant role in authentic leadership development. Leadership scholars should emphasize the forming experiences of authentic leadership in their leadership development studies. In other words, the experienced dynamics of parents (life mottos and definitions of success), the experience of crucibles are suggested as antecedents of authentic leadership. The research shows that parents’ dynamics, crucibles, and life-triggering moments resonate with Erikson’s stages of development on authentic leadership development.


2021 ◽  
Vol 37 (4) ◽  
pp. 981-1007
Author(s):  
Darina N. Peycheva ◽  
Joseph W. Sakshaug ◽  
Lisa Calderwood

Abstract Coding respondent occupation is one of the most challenging aspects of survey data collection. Traditionally performed manually by office coders post-interview, previous research has acknowledged the advantages of coding occupation during the interview, including reducing costs, processing time and coding uncertainties that are more difficult to address post-interview. However, a number of concerns have been raised as well, including the potential for interviewer effects, the challenge of implementing the coding system in a web survey, in which respondents perform the coding procedure themselves, or the feasibility of implementing the same standardized coding system in a mixed-mode self- and interviewer-administered survey. This study sheds light on these issues by presenting an evaluation of a new occupation coding method administered during the interview in a large-scale sequential mixed-mode (web, telephone, face-to-face) cohort study of young adults in the UK. Specifically, we assess the take-up rates of this new coding method across the different modes and report on several other performance measures thought to impact the quality of the collected occupation data. Furthermore, we identify factors that affect the coding of occupation during the interview, including interviewer effects. The results carry several implications for survey practice and directions for future research.


Crystals ◽  
2021 ◽  
Vol 11 (12) ◽  
pp. 1461
Author(s):  
Mingran Zhang ◽  
Guangrui Gu

Acoustic focusing with intensity modulation plays an important role in biomedical and life sciences. In this work, we propose a new approach for simultaneous phase and amplitude manipulation in sub-wavelength coupled resonant units, which has not been reported so far. Based on the equivalent impedance and refractive index modulation induced by the change of geometry, arbitrary amplitude response from 0 to 1 and phase shift from 0 to 2π is realized. Thus, the acoustic focusing with intensity modulation can be achieved via waveguide array. Herein, the focal length can be adjusted by alternating the length of supercell, and the whole system can work in a broadband of 0.872f0–1.075f0. By introducing the coding method, the thermal viscosity loss is reduced, and the wavefront modulation can be more accurate. Compared with previous works, our approach has the advantages of simple design and broadband response, which may have promising applications in acoustic communication, non-destructive testing, and acoustic holography.


2021 ◽  
pp. 260-265
Author(s):  
L.R. Zhao ◽  
H.D. Zhao ◽  
D.C. Gao* ◽  
J.W. Cai

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Han Hu

Computer-aided composition is an attempt to use a formalized process to minimize human (or composer) involvement in the creation of music using a computer. Exploring the problem of computer-aided composition can enable us to understand and simulate the thinking mode of composers in the special process of music creation, which is an important application of artificial intelligence in the field of art. Feature extraction on the MIDI files has been introduced in this paper. Based on the genetic algorithm in this paper, a platform of the sampling coding method to optimize the character representation has solved the traditional algorithmic music composition study. Music directly from the pitch and duration can be derived from the characteristics, respectively, in the form of a one-hot encoding independently said. Failure to the rhythm of the characterization of the pitch and duration are problems that lead to the inability of compositional networks to learn musical styles better. Rhythm is the combination of pitch and time values according to certain rules. The rhythm of music affects the overall style of music. By associating the pitch and time value coding, the rhythm style of music can be preserved better so that the composition network can learn the style characteristics of music more easily.


Atmosphere ◽  
2021 ◽  
Vol 12 (11) ◽  
pp. 1518
Author(s):  
Haoyi Chen ◽  
Kai Yuan ◽  
Ming Yao ◽  
Jiawei Xiong

Many modern ionospheric studies rely on incoherent scatter radars (ISR) since this kind of radar is able to detect various ionospheric parameters over very long ranges. The performance of ISR significantly depends on its coding system. In recent decades, a new type of coding system, which is the so-called composite coding, was presented. It used to be constructed by using a certain code to modulate alternating code to achieve better detection resolution and anti-noise performance for ISRs. In the present study, a new composite coding system was presented, which is constructed based on complementary codes and alternating codes. In this paper, the performance of the new composite code will be compared with that of several traditional codes to show that the new composite code can help to improve the detection performance of the ISR. According to the analysis based on the ambiguity function, the present composite coding system helps to improve the range resolution and detection range for ISR detections. In addition, numerical tests on anti-noise performance show that the complementary composite coding system has a good anti-noise performance and helps to reduce the necessary times of incoherent integration. As a result, the composite coding system can improve the time resolution.


Sign in / Sign up

Export Citation Format

Share Document