The Research of Malicious Code's Spread and Found Technology

2013 ◽  
Vol 860-863 ◽  
pp. 2750-2753
Author(s):  
Ya Qin Fan ◽  
Xin Zhang ◽  
Xin Yu Chen ◽  
Chi Li

In order to defense malicious codes increasing serious infestations actively. We proposed several corresponding malicious code found and detection technology on the basis of malware propagation principle. We use MATLAB simulation software to achieve the malware propagation model and detection technology. We proved the practicability of the discovery technology, and present improved methods for the deficiency of the model.

2013 ◽  
Vol 765-767 ◽  
pp. 1263-1266
Author(s):  
Ya Qin Fan ◽  
Ge Zhang ◽  
Miao Liu ◽  
Xin Zhang

This paper studies the development trend of intelligent mobile phone, confirmed the necessity of research on intelligent mobile phone malicious code. Study on the detection technology, proposed intelligent mobile phone regular networks and random networks based on malicious code propagation model, propagation mechanism is studied. Set up a perfect malicious code discovery and defense system model, at different levels is put forward that different, prove the necessity of scanning algorithm and Semantic Detection Algorithm for eigenvalue. To improve the security of the whole communication network.


2019 ◽  
Vol 13 (1) ◽  
pp. 17-29 ◽  
Author(s):  
Yerra Shankar Rao ◽  
Prasant Kumar Nayak ◽  
Hemraj Saini ◽  
Tarini Charana Panda

This article describes a highly infected e-epidemic model in a computer network. This article establishes the Basic reproduction number R0, which explicitly brings out the stability conditions. Further, the article shows that if R0< 1 then the infected nodes ceases the spreading of malicious code in computer network as it dies down and consequently establishes the asymptotically stable, when R0> 1, the alternative aspect is that infected nodes stretch out into the network and becomes asymptotically unstable. The pivotal, impact of quarantine node on e-epidemic models has been verified along with its control strategy for a high infected computer network. In the MATLAB simulation, the quarantine class shows its explicit relationship with respect to high as well as low infected class, exposed class, and finally, with recovery class in order to yield increasing safety measures on transmission of malicious codes.


Author(s):  
Satya Ranjan Biswal ◽  
Santosh Kumar Swain

: Security is one of the important concern in both types of the network. The network may be wired or wireless. In case of wireless network security provisioning is more difficult in comparison to wired network. Wireless Sensor Network (WSN) is also a type of wireless network. And due to resource constraints WSN is vulnerable against malware attacks. Initially, the malware (virus, worm, malicious code, etc.) targets a single node of WSN for attack. When a node of WSN gets infected then automatically start to spread in the network. If nodes are strongly correlated the malware spreads quickly in the network. On the other hand, if nodes are weakly correlated the speed of malware spread is slow. A mathematical model is proposed for the study of malware propagation dynamics in WSN with combination of spatial correlation and epidemic theory. This model is based on epidemic theory with spatial correlation. The proposed model is Susceptible-Exposed-Infectious-Recover-Dead (SEIRD) with spatial correlation. We deduced the expression of basic reproduction number. It helps in the study of malware propagation dynamics in WSN. The stability analysis of the network has been investigated through proposed model. This model also helps in reduction of redundant information and saving of sensor nodes’ energy in WSN. The theoretical investigation verified by simulation results. A spatial correlation based epidemic model has been formulated for the study of dynamic behaviour of malware attacks in WSN.


2021 ◽  
Vol 12 (1) ◽  
pp. 44
Author(s):  
Gururaj Banda ◽  
Sri Gowri Kolli

This article deals with an intelligent adaptive neural network (ANN) controller for a direct torque controlled (DTC) electric vehicle (EV) propulsion system. With the realization of artificial intelligence (AI) conferred adaptive controllers, the torque control of an electric car (eCAR) propulsion motor can be achieved by estimating the stator reference flux voltage used to synthesize the space vector pulse width modulation (SVPWM) for a DTC scheme. The proposed ANN tool optimizes the parameters of a proportional integral (PI) controller with real-time data and offers splendid dynamic stability. The response of an ANN controller is examined over standard drive cycles to validate the performance of an eCAR in terms of drive range and energy efficiency using MATLAB simulation software.


2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Chai Jianwen

This paper mainly studies the basic concept of baseband transmission of digital signal and the transmission processof digital signal baseband transmission and how to design digital baseband transmission system with MATLABsoftware simulation. This paper fi rst introduces the theoretical basis of this subject, including digital communication,the composition of digital baseband transmission system and digital baseband signal transmission process. Then thepaper introduced the characteristics of digital baseband transmission system, including digital PAM signal powerdensity and common line pattern, and by comparing choosing the fi nal bipolar zero return code. Then we introducedthe MATLAB simulation software. The conditions of the best reception of the digital baseband signal are describedand how the waveform of the baseband signal is observed by an oscilloscope. Finally, according to the basic stepsof simulation process, the simulation process of digital baseband transmission system is realized by MATLABsimulation tool, and the system is analyzed.


2011 ◽  
Vol 217-218 ◽  
pp. 1647-1651
Author(s):  
Ming Ming Wen

It is significance to predict coal production for balancing coal supply and demand in China. The primary goal of this research is the prediction of coal production in china. The method used in the study is known as the BP neural network. The BP neural network is designed with the MATLAB simulation software based on coal production historical data from 1980 to 2007. The studies we have performed showed that the prediction of coal production based on BP neural network is reasonable and valuable. Finally, we get the prediction of coal production from 2010 to 2015, and the prediction indicates that the coal production will increase in the next 5 years.


Author(s):  
Sudha Bhutada ◽  
S.R. Nigam

<p>In this paper, a single-phase PV inverter applying a dual boost converter circuit inverter is proposed for photovoltaic (PV) generation system and PV grid connected system. This system is designed to improve integration of a Single phase inverter with Photovoltaic panel. The DC 24V is converted into to 86V DC and then 86V DC to 312V DC. The 312 V DC is then successfully inverted to AC 220V. Hence solar energy is powerfully converted into electrical energy for fulfilling the necessities of the home load, or to link with the grid. Matlab Simulation software was used for simulation of the circuit and outcome is presented in this paper.</p>


2011 ◽  
Vol 194-196 ◽  
pp. 1524-1528 ◽  
Author(s):  
Ming Shan Yang ◽  
Lin Kai Li ◽  
Yang Liu

By means of matching filling of five kinds of spherical silica with the particle size of 2μm, 3μm, 5μm, 10μm, 20μm respectively, the epoxy molding compounds(EMC) for integrated circuits(IC) were manufactured. Using classical particle accumulation theory, the particle distribution according with Dinger-Funk-Alfred equation was calculated by Matlab simulation software, and then the optimal particle size formulations were obtained. Adding the mixed silica according to the above optimal formulations into epoxy resin, the EMCs were manufactured by twin-roll compounding at 95~105°С . The melt viscosities of varied EMCs were measured by Rotating Rheometer. The results showed that the matching filling of different silica with different particle size can improve the flowability of EMC greatly.


Sign in / Sign up

Export Citation Format

Share Document