Implementation of Portable Antivirus System using Signature-based Detection and Heuristic Analysis

Author(s):  
Akshay Chavan ◽  
Keerti Kerakalamatti ◽  
Snigdha Srivastva
Keyword(s):  
Perception ◽  
1993 ◽  
Vol 22 (12) ◽  
pp. 1441-1465 ◽  
Author(s):  
Jeffrey C Liter ◽  
Myron L Braunstein ◽  
Donald D Hoffman

Five experiments were conducted to examine constraints used to interpret structure-from-motion displays. Theoretically, two orthographic views of four or more points in rigid motion yield a one-parameter family of rigid three-dimensional (3-D) interpretations. Additional views yield a unique rigid interpretation. Subjects viewed two-view and thirty-view displays of five-point objects in apparent motion. The subjects selected the best 3-D interpretation from a set of 89 compatible alternatives (experiments 1–3) or judged depth directly (experiment 4). In both cases the judged depth increased when relative image motion increased, even when the increased motion was due to increased simulation rotation. Subjects also judged rotation to be greater when either simulated depth or simulated rotation increased (experiment 4). The results are consistent with a heuristic analysis in which perceived depth is determined by relative motion.


2017 ◽  
Vol 826 ◽  
pp. 975-995
Author(s):  
Sergey Alyaev ◽  
Eirik Keilegavlen ◽  
Jan Martin Nordbotten ◽  
Iuliu Sorin Pop

The process of initial ice formation in brine is a highly complex problem. In this paper, we propose a mathematical model that captures the dynamics of nucleation and development of ice inclusions in brine. The primary emphasis is on the interaction between ice growth and salt diffusion, subject to external forcing provided by temperature. Within this setting two freezing regimes are identified, depending on the rate of change of the temperature: a slow freezing regime where a continuous ice domain is formed; and a fast freezing regime where recurrent nucleation appears within the fluid domain. The second regime is of primary interest, as it leads to fractal-like ice structures. We analyse the critical threshold between the slow and fast regimes by identifying the explicit rates of external temperature control that lead to self-similar salt-concentration profiles in the fluid domains. Subsequent heuristic analysis provides estimates of the characteristic length scales of the fluid domains depending on the time-variation of the temperature. The analysis is confirmed by numerical simulations.


Sociologija ◽  
2015 ◽  
Vol 57 (3) ◽  
pp. 421-437
Author(s):  
Matija Jovanovic

This paper discusses two neomarxist theories of ecological crises - theory of metabolic rift and the second contradiction of capitalism theory. The goal of the paper is to present two critical theories and to confront them so similarities, differences, flaws and contributions of those theories can be identified. In the first part of the paper author classifies different approaches to ecological crisis and sustainable development in order to relate two neomarxist theories to other approaches to the topic. In the second part, author discusses theory of metabolic rift, which is a heuristic analysis of Marx?s original work. In other words, this theory represents a new reading of the classic and tries to integrate it?s new findings about envirnmental side of Marx?s thought into a contemporary marxist theory. Third part of the paper is reserved for the second contradiction of capitalism, a neomarxist theory of economic crisis which can be applied as a theory of ecological crisis. Two theories are then confronted after which similarities and differences between them are pointed out. The author concludes the paper by stressing out the flaws and scientific contributions of the two theories.


2020 ◽  
Vol 12 (2) ◽  
pp. 143-153
Author(s):  
Christian Ronaldo Sopaheluwakan ◽  
Dian Widiyanto Chandra

Backdoor or commonly also known as web shell is one of the malicious software that hackers use to maintain access systems that they have entered. Relatively few programs like Anti Web-Shell, PHP Backdoor Scanner circulating on the Internet, and can be obtained free of charge to deal with the issues above. But most of these programs have no actual database of signature behavior to deal with PHP backdoor / Shell nowadays. Then comes the contemporary Anti Web-Shell program that can deal with today's backdoor shell. This study uses an experimental method concerning previous similar studies and is implemented directly into the world of cyber security professional industries. By enriching the Regex dictionary signature and String Array Matching the actualized Anti Web-Shell program can detect more backdoor than similar programs that have existed in the past. The results of this study are in the form of a web application software in PHP extension. The application can minimize 100% of false positives and is twice as fast in scanning files because it is more specific in heuristic analysis scan.


Author(s):  
Francisco V. Cipolla-Ficarra ◽  
Alejandra Quiroga ◽  
Jim Carré ◽  
Jacqueline Alma ◽  
Miguel Cipolla-Ficarra

The authors present the first results of a heuristic analysis of the evolution of the commercial off-line systems related to the main European museums. The analysis is diachronic, that is, since 1990, and includes the different modalities of interactive design in the different supports for interactive information, such as floppy, CD, and DVD. The authors also present a methodology for the analysis of the presentation of the paintings and sculptures inside these systems called Museum Information and Communicability Evaluation (MICE).


Author(s):  
E Maghsoodi ◽  
H Hassanabadi ◽  
Won Sang Chung

Abstract We investigate the effect of the generalized uncertainty principle on the thermodynamic properties of the topological charged black hole in anti-de Sitter space within the framework of doubly special relativity. Our study is based on a heuristic analysis of a particle which is captured by the black hole. We obtain some thermodynamic properties of the black hole including temperature, entropy, and heat capacity in the spherical horizon case.


Sign in / Sign up

Export Citation Format

Share Document