scholarly journals Extraction of Creation-Time for Recovered Files on Windows FAT32 File System

2019 ◽  
Vol 9 (24) ◽  
pp. 5522 ◽  
Author(s):  
Wan Yeon Lee ◽  
Kyong Hoon Kim ◽  
Heejo Lee

In this article, we propose a creation order reconstruction method of deleted files for the FAT32 file system with Windows operating systems. Creation order of files is established using a correlation between storage locations of the files and their directory entry locations. This method can be utilized to derive the creation-time bound of files recovered without the creation-time information. In this article, we first examine the file allocation behavior of Windows FAT32 file system. Next, based on the examined behavior, we propose a novel method that finds the creation order of deleted files after being recovered without the creation-time information. Due to complex behaviors of Windows FAT32 file system, the method may find multiple creation orders although the actual creation order is unique. In experiments with a commercial device, we confirm that the actual creation order of each recovered file belongs to one of the creation orders found by the method.

Author(s):  
Keeley Wilson

In the late 1990s, after Nokia developed the first smartphone (the “Communicator”), executives became increasingly sensitive to the importance of operating systems, data communications, and multimedia. It was also becoming clear that more complex business models would be needed to tap in to new opportunities. This chapter describes and analyzes how Nokia managed this transformation. It describes the development of the Communicator smartphone, the establishment of the Symbian OS, and the creation of an innovative camera phone. As the nature of the industry was changing and becoming more complex, it also looks at how Nokia responded by engaging with a wider ecosystem to develop the visual radio concept. These examples highlight the challenges that the new world of software platforms and application ecosystems raised for Nokia.


2003 ◽  
Vol 3 (1) ◽  
pp. 76-86 ◽  
Author(s):  
Chuan-Chu Kuo ◽  
Hong-Tzong Yau

In the framework of Virtual CMM [1], virtual parts are proposed to be constructed as triangulated surface models. This paper presents a novel surface reconstruction method to the creation of virtual parts. It is based on the idea of identification and sculpting of concave regions of a Delaunay triangulation of the sample data. The proposed algorithm is capable of handling the reconstruction of surfaces with or without boundaries from unorganized points. Comparisons with other Delaunay-based algorithms show that it is more efficient in that it can optimally adapt to the geometric complexity of the sampled object. To validate the proposed algorithm, some detailed illustrations are given.


Author(s):  
Nils Reimers ◽  
Nazanin Dehghani ◽  
Iryna Gurevych

Extracting the information from text when an event happened is challenging. Documents do not only report on current events, but also on past events as well as on future events. Often, the relevant time information for an event is scattered across the document. In this paper we present a novel method to automatically anchor events in time. To our knowledge it is the first approach that takes temporal information from the complete document into account. We created a decision tree that applies neural network based classifiers at its nodes. We use this tree to incrementally infer, in a stepwise manner, at which time frame an event happened. We evaluate the approach on the TimeBank-EventTime Corpus (Reimers et al., 2016) achieving an accuracy of 42.0% compared to an inter-annotator agreement (IAA) of 56.7%. For events that span over a single day we observe an accuracy improvement of 33.1 points compared to the state-of-the-art CAEVO system (Chambers et al., 2014). Without retraining, we apply this model to the SemEval-2015 Task 4 on automatic timeline generation and achieve an improvement of 4.01 points F1-score compared to the state-of-the-art. Our code is publically available.


Electronics ◽  
2019 ◽  
Vol 8 (5) ◽  
pp. 533 ◽  
Author(s):  
Heeyeon Jo ◽  
Jeongtae Kim

We investigated a novel method for separating defects from the background for inspecting display devices. Separation of defects has important applications such as determining whether the detected defects are truly defective and the quantification of the degree of defectiveness. Although many studies on estimating patterned background have been conducted, the existing studies are mainly based on the approach of approximation by low-rank matrices. Because the conventional methods face problems such as imperfect reconstruction and difficulty of selecting the bases for low-rank approximation, we have studied a deep-learning-based foreground reconstruction method that is based on the auto-encoder structure with a regression layer for the output. In the experimental studies carried out using mobile display panels, the proposed method showed significantly improved performance compared to the existing singular value decomposition method. We believe that the proposed method could be useful not only for inspecting display devices but also for many applications that involve the detection of defects in the presence of a textured background.


2014 ◽  
Vol 2014 ◽  
pp. 1-20 ◽  
Author(s):  
Michal Jancosek ◽  
Tomas Pajdla

We present a novel method for 3D surface reconstruction from an input cloud of 3D points augmented with visibility information. We observe that it is possible to reconstruct surfaces that do not contain input points. Instead of modeling the surface from input points, we model free space from visibility information of the input points. The complement of the modeled free space is considered full space. The surface occurs at interface between the free and the full space. We show that under certain conditions a part of the full space surrounded by the free space must contain a real object also when the real object does not contain any input points; that is, an occluder reveals itself through occlusion. Our key contribution is the proposal of a new interface classifier that can also detect the occluder interface just from the visibility of input points. We use the interface classifier to modify the state-of-the-art surface reconstruction method so that it gains the ability to reconstruct weakly supported surfaces. We evaluate proposed method on datasets augmented with different levels of noise, undersampling, and amount of outliers. We show that the proposed method outperforms other methods in accuracy and ability to reconstruct weakly supported surfaces.


1980 ◽  
Vol 13 (1) ◽  
pp. 1-26 ◽  
Author(s):  
P. B. Wood

Central to Thomas Sprat's History of the Royal Society was the description and justification of the method adopted and advocated by the Fellows of the Society, for it was thought that it was their method which distinguished them from ancients, dogmatists, sceptics, and contemporary natural philosophers such as Descartes. The Fellows saw themselves as furthering primarily a novel method, rather than a system, of philosophy, and the History gave expression to this corporate self-perception. However, the History's description of their method was not necessarily accurate. Rather, as will be argued below, by a combination of subtle misrepresentation and selective exposition, Sprat portrayed a method which would further the aims of social and ecclesiastical stability and material prosperity, essential for the Royal Society since its continued existence depended upon the creation of a social basis for the institutionalized pursuit of natural philosophy. Some link had to be forged between the activities of the Society and the intellectual and social aspirations of the Restoration. To understand the intent and meaning of Sprat's History and the method there portrayed, we must therefore look to the institutional needs which it fulfilled.


2020 ◽  
Vol 4 (2) ◽  
pp. 41-51
Author(s):  
Wisnu Sanjaya ◽  
Bambang Sugiantoro ◽  
Yudi Prayudi

The rapid development of the IT world has covered all aspects of life and among IT technology products is the creation of Operating Systems and Web browser applications. Privacy in the use of IT in the open era is now highly expected, therefore now widely developed Operating Systems and Web browser applications that have facilities to protect user privacy. Linux and TOR Browser is a combination that is widely used in the field of security, but unfortunately many are misused by the person in a crime. The motivation to use both is to eliminate or minimize the digital footprint of the browsing activity so that it will complicate the search of digital evidence in a crime. This research proposes a framework of stages for TOR Browser analysis in Linux Operating System which aims to provide solution in forensic investigation using offline forensic method. The use of offline forensic methods to obtain detailed information from a digital proof on a computer in a off state


A color mapping is a process by which we transfer the particular range of colors from source to the target image. This paper says about a novel method for medical images using pseudocolor by pre existence of color mapping. Conversion of grey scale image to color has no exact way or approach, direct way to colorize is tedious by which the entire range of colors can be changed, but in color mapping the conversion is done by converting the whole black and white image into color. This novel method presents black and white image to various colors. By the creation of color map that color map is applied for colorizing the medical grey scale images. This approach can be used for grey scale medical images irrespective of size and shape such that the intensity and aspect of the image can be improved


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lucas Fernandez ◽  
Ravi Prakash

PurposeThe purpose of this paper is to present topological derivatives-based reconstruction algorithms to solve an inverse scattering problem for penetrable obstacles.Design/methodology/approachThe method consists in rewriting the inverse reconstruction problem as a topology optimization problem and then to use the concept of topological derivatives to seek a higher-order asymptotic expansion for the topologically perturbed cost functional. Such expansion is truncated and then minimized with respect to the parameters under consideration, which leads to noniterative second-order reconstruction algorithms.FindingsIn this paper, the authors develop two different classes of noniterative second-order reconstruction algorithms that are able to accurately recover the unknown penetrable obstacles from partial measurements of a field generated by incident waves.Originality/valueThe current paper is a pioneer work in developing a reconstruction method entirely based on topological derivatives for solving an inverse scattering problem with penetrable obstacles. Both algorithms proposed here are able to return the number, location and size of multiple hidden and unknown obstacles in just one step. In summary, the main features of these algorithms lie in the fact that they are noniterative and thus, very robust with respect to noisy data as well as independent of initial guesses.


Sign in / Sign up

Export Citation Format

Share Document