computer file
Recently Published Documents


TOTAL DOCUMENTS

87
(FIVE YEARS 6)

H-INDEX

4
(FIVE YEARS 0)

Author(s):  
Shshank Sourabh ◽  
Diwakar Chauhan ◽  
Vinay Singh ◽  
Monika Chauhan

Objective: The use of smartphones has exponentially increased over the past decade. Nowadays the use of a cellphone has not just been restricted to make calls, but it's also actively used to connect people throughout the globe through social media and sharing multimedia files over the internet. Smartphones have made these things possible and easily available with just a single touch. But along with this development and digitalization, an increase in the rate of cybercrime has also surfaced, which includes crime like illicit possession, distribution, and modification of multimedia files. Hence, smartphones are seen as a rich source of evidence-based on the crimes discussed. This process is carried out to analyze smartphone‟s multimedia files to determine their origin and to verify if the multimedia files originated from the same device or transferred through any process. Methods: An examiner must analyze, recover, and authenticate the files stored in a smartphone device. Android version 9 was used for analysis since it is the most common and abundant platform generally found in most people‟s phones. Examination of computer file is achieved by analyzing the file in hexadecimal editor software, the software used in this analysis is HxD. Results: File signature and metadata analysis of smartphones‟ multimedia files was performed to render the source of the files. Conclusion: The conducted file signature and metadata analysis clearly stated that by using hexadecimal editor softwareHxD origin and source of smartphones‟ multimedia file can be rendered.


2019 ◽  
Vol 8 (1) ◽  
pp. 527
Author(s):  
Salfiko Hidayat ◽  
Malta Nelisa

AbstractThis paper discusses the need for randai information and the process of making Randai Information Repackage for Students at SMAN 1 V Koto Timur. This study aims to determine the need for randai information and how to re-make randai information for students in SMA N 1 V Koto Timur. This study uses a descriptive method that is conducting direct interviews with a number of students at SMAN N 1 V Koto Timur, Padang Pariaman Regency. First, the need for randai information in SMAN 1 V Koto Timur, there are still some students who want to meet the general information needs both from other information such as reading materials in the library such as books and randai activities themselves. Secondly, there are several stages in making information back: (1) Identifying user needs by collecting and examining what will be contained in the information package; (2) Finding the needed sources, searching for information by collecting selected books and articles/ journals from the internet; (3) The collection of information that has been obtained from several books and articles/ journals from the internet is then stored in a computer file or flashdisk; (4) Packaging information by selecting data from various sources of books and articles/ internet journals and packaged in printed form; (5) Determine the form of information packaging to be made, namely printed; (6) Editing, checking deficiencies and forming packaging to make it more attractive and easily read by information users; (7) Printing of packaging is in the form of print publication. Third, in making information repackaging there are some obstacles. First, Constraints: (1) Data search and information gathering; (2) Lack of expertise in making packaging; (3) Determination of information to be contained in the package. Second, the efforts made: (1) Gathering as much data as possible from books, journals and other official articles; (2) Asking for help from experts to help the process of making packaging; (3) Finding information from several journals and book.Keywords: information, randai, and repackage 


Steganography is with the intention of the art and science of writing secreted messages in such with the aim of nobody excluding the dispatcher and supposed recipient, suspects the existence of the message. We tend to tend to are constructing Associate in Nursing implementing a fresh algorithm supported activity an oversized amount of information (image, audio, text) file into color BMP image. We have been used adaptive image filtering and adaptive image segmentation with bits replacement on the suitable pixels. These image parts are elite willy-nilly rather than consecutive by using a brand new plan made public by main cases with their sub cases for each store unit in one component. this concept supports every visual and mathematics in line with the steps of fashion, we have been everywhere sixteen main cases with their sub cases that cowl all aspects of the computer file into color icon image. High-security layers are projected through 3 layers to form it arduous to interrupt through the committal to writing of the laptop file and confuse steganalysis too. These techniques are a great deal of useful for investigation the stego footage what is more as a result of the image media regarding security of images and embed the knowledge for advanced image area which we'll merely calculate approximately the high embed rate by victimization the quantitative steganalysis technique.


Author(s):  
S. Baskaran ◽  
S. Venkatesan

The analysis itself however in the midst of preparation and post-processing steps. Handling information returning directly from the supply, e.g. a sensor, typically needs preconditioning like parsing and removing orthogonal data before data processing algorithms will be applied to research the info. complete data processing frameworks generally don't offer such parts since they need a currency computer file format. what is more, they're typically restricted to the offered algorithms or a speedy integration of latest algorithms for the aim of fast testing isn't attainable. to deal with this disadvantage, we have a tendency to gift the info analysis framework Knowing, that is well extendable with extra algorithms by exploitation associate OSGi compliant design. the software package and therefore the hypervisor out of the TCB; therefore, confidentiality and integrity square measure preserved albeit these massive parts square measure compromised. VC3 depends on SGX processors to isolate memory regions on individual computers, and to deploy new protocols that secure distributed MapReduce computations. VC3 optionally enforces region self-integrity invariants for all MapReduce code running inside isolated regions, to stop attacks thanks to unsafe memory reads and writes. Experimental results on common benchmarks show that VC3 performs well compared with unprotected Hadoop: VC3's average runtime overhead is negligible for its base security guarantees, 4.5% with write integrity and eight with read/write integrity.


2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Nelson Ochieng ◽  
Waweru Mwangi ◽  
Ismail Ateya

The scope of this research is computer worm detection. Computer worm has been defined as a process that can cause a possibly evolved copy of it to execute on a remote computer. It does not require human intervention to propagate neither does it attach itself to an existing computer file. It spreads very rapidly. Modern computer worm authors obfuscate the code to make it difficult to detect the computer worm. This research proposes to use machine learning methodology for the detection of computer worms. More specifically, ensembles are used. The research deviates from existing detection approaches by using dark space network traffic attributed to an actual worm attack to train and validate the machine learning algorithms. It is also obtained that the various ensembles perform comparatively well. Each of them is therefore a candidate for the final model. The algorithms also perform just as well as similar studies reported in the literature.


Author(s):  
Carl Fleischhauer

Archives hold original video recordings in a range of types, from media-dependent, carrier-based analogue videotapes to computer-file-based digital recordings. The appropriate preservation treatments for this array reflect the variation in the source recordings. For analogue videotapes, for example, digitisation is called for. Meanwhile, examples of digital file-based recording may require rewrapping into a fresh file "wrapper" or a combination of digital transcoding and rewrapping. When complete, IASA-TC 06 will cover the full range of topics in the preceding paragraph, as well as providing advice on shooting ethnographic, documentary, and oral history video footage in a manner that maximizes its "preserve-ability".


2018 ◽  
Vol 0 (0) ◽  
Author(s):  
Arun Kumar ◽  
Hemant Rathore

AbstractIn this work, OFDM (orthogonal frequency division multiplexing) is analyzed for different transmission schemes on the basis of BER (Bit Error Rate), transmitting-receiving signal, constellation diagram and the best transmitting scheme is determined for OFDM. OFDM is analogous to Frequency Division Multiple Access (FDMA) in which the multiple user access is achieved by sub-dividing the existing spectrum into various channels, which are then allocated to users. In this paper Mat-lab simulation OFDM is used to see, how the Bit Error Ratio (BER) of a transmission varies when signal to Noise Ratio (S/N) and Multi-Propagation effect are altered to transmit a computer file in binary data from modulated by 16-QAM and QPSK modulation, finally at the end of the transmission, when the receiver receives the data, a comparison of the transmitted and the received messages is done in order to calculate the Bit Error Ratio (BER).


2018 ◽  
Vol 6 (1) ◽  
pp. 62
Author(s):  
Valker Araújo Dos Santos ◽  
José Marcato Júnior

The aim of this article is to present the use of GIS (Geographic Information Systems) as a support tool for cartographical mapping related to the Orienteering Sport, as a contribution for the enhancement of the currently used techniques, which result will be spread between the members of the Quadro de Mapeadores da CBO (Brazilian Federation of Orienteering), which gathers the main cartographers of the sport in Brazil and regulates the main aspects related to the production of maps for Orienteering. Therefore, the Campus of UFMS (Universidade Federal de Mato Grosso do Sul) was mapped, according to the ISSOM 2007 (International Specification for Sprint Orienteering Maps), on the scale of 1:4.000 using orthophotographs with ground sample distance of 10 cm and vectorial files (contour lines with equidistance of 1 metre and urban zoning) of Campo Grande city distributed freely by Prefeitura Municipal de Campo Grande as data source for the base map. The data was processed using the software QGIS (QGIS Development Team 2016), a free and open source Geographical Information System (GIS), and the Original Computer File was developed using OCAD software, an specific program for Orienteering maps, being validated by its utilisation on the final stage of the II Campeonato Sul-Mato-Grossense de Orientação (2nd Orienteering Championship of Mato Grosso do Sul). To ratify, in official ways, the obedience to the international specifications, it was sent to the evaluation of the Quadro de Mapeadores da CBO (the official cartographers group of CBO) and, as a result, it was approved and included in the data base of the confederation, under the register number 232.


Sign in / Sign up

Export Citation Format

Share Document