Equivalent Static Analysis Method for Barge Impact-Resistant Bridge Design

2011 ◽  
Vol 16 (6) ◽  
pp. 718-727 ◽  
Author(s):  
Daniel J. Getter ◽  
Gary R. Consolazio ◽  
Michael T. Davidson
Symmetry ◽  
2020 ◽  
Vol 13 (1) ◽  
pp. 35
Author(s):  
Sungjoong Kim ◽  
Seongkyu Yeom ◽  
Haengrok Oh ◽  
Dongil Shin ◽  
Dongkyoo Shin

The development of information and communication technology (ICT) is making daily life more convenient by allowing access to information at anytime and anywhere and by improving the efficiency of organizations. Unfortunately, malicious code is also proliferating and becoming increasingly complex and sophisticated. In fact, even novices can now easily create it using hacking tools, which is causing it to increase and spread exponentially. It has become difficult for humans to respond to such a surge. As a result, many studies have pursued methods to automatically analyze and classify malicious code. There are currently two methods for analyzing it: a dynamic analysis method that executes the program directly and confirms the execution result, and a static analysis method that analyzes the program without executing it. This paper proposes a static analysis automation technique for malicious code that uses machine learning. This classification system was designed by combining a method for classifying malicious code using a portable executable (PE) structure and a method for classifying it using a PE structure. The system has 98.77% accuracy when classifying normal and malicious files. The proposed system can be used to classify various types of malware from PE files to shell code.


2013 ◽  
Vol 753-755 ◽  
pp. 1250-1253
Author(s):  
Na Wu

Nunmerical analysis method was used to analyze multi-chip tapered leaf spring with the same area under vertical loads, in which the brick element of twenty nodes was used to model the spring leaves and the solid modeling using in ansys was modeled in 3D softwar. Each piece of nodes were coupled in order to simulate the leaf spring assembly process. The results of six modes analysis and static analysis could be the research basis for the further study of leaf spring.


Author(s):  
Deepti Venugopal ◽  
P.D. Mahendiran ◽  
G. Usha ◽  
S. Kannimuthu ◽  
Anusha Kadambari Shanker

2014 ◽  
Vol 578-579 ◽  
pp. 872-876
Author(s):  
Xiao Peng Nie ◽  
Xin Gang Li ◽  
Hong Wei Fan ◽  
Ke Qin Ding ◽  
Li Bin Xu

most crane damage identification of the work has focused on the static analysis, that can't explain whether the crane has a damage or not by this way. So the paper explained the modal signal to analysis this problem , Used 300 tons gantry crane’s beam for background and ANSYS software as a tool was used for numerical simulation. The purpose is to find difference between the damage beam of the crane and health one,because if there was a damage on the beam , the formations and frequency will be changed. This theory of analysis is based on the vibration equation. In order to illustrate it better, the wavelet analysis method as a tool has been used ,in this case the signal was filtered, we can judge the damage location from the three dimensional curve. The basic aim of this paper is to arrive at a better way to judge the damage.Through the above analysis, the results proved the author's idea, identify structural’s damage basically, but it still need further research.


Author(s):  
Samuel Sinambela ◽  
Aditya Robbi Pangestu ◽  
Rangga Feriyanto

Abstrak: Terkadang pengguna android tidak hati-hati saat berselancar diinternet dan tanpa sadar sebuah malware telah terinstal di perangkat mereka. Malware inilah yang nantinya akan menjadi jalan bagi penyerang untuk mengambil sesuatu di perangkat korban. Maka dari itu, diperlukannya analisis untuk mengetahui apa saja akses yang dibutuhkan ketika sebuah Malware terunduh di perangkat korban. Tujuan Penelitian adalah untuk menganalisis mendapatkan informasi malware yang terdapat pada aplikasi. Metode yang dipakai dalam penelitian ini menggunakan metode kuantitatif. Sample malware akan diambil melalui iklan dan menganalisis malware tersebut menggunakan metode analisis static yang hanya membaca informasi malware tanpa harus menginstalnya. Hasil dari analisis, terdeteksi Malware dan memiliki perizinan yang tidak pada tempatnya. Seperti yang terlihat, aplikasi game tidak memerlukan izin untuk melihat panggilan yang berlangsung. Maka dari itu, diperlukannya kejelian pengguna agar tidak sembarangan mengunduh atau mengklik sesuatu ketika berinternet. User juga harus update pada keamanan perangkat yang dimiliki.Kata kunci: Malware, Analisis Statik, AndroidAbstract: Sometimes Android users are not careful when surfing the internet and unknowingly have malware installed on their devices. This malware is what will later become a way for attackers to take something on the victim's device. Therefore, analysis is needed to see what access is needed when malware is downloaded on the victim's device. The research objective is to analyze the malware information contained in the application. The method used in this research is quantitative methods. Malware samples will be taken through advertisements and analyze the malware using a static analysis method that only reads malware information without having to install it. As a result of the analysis, the malware was detected and had inappropriate permissions. As you can see, the game application is not allowed to see the ongoing calls. Therefore, users need carefulness, so they do not download or click something when surfing the internet. Users also have to update on their own devicesKeywords: Malware, Static Analysis, Android  


2009 ◽  
Vol 65 (3) ◽  
pp. 346-355
Author(s):  
Naoyuki OTA ◽  
Tomoyasu SUGIYAMA ◽  
Katsuya OKADA ◽  
Osamu NUNOKAWA ◽  
Makoto TORIIHARA ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document