Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Mathematics (4)
- Physical Sciences and Mathematics (4)
- Data Storage Systems (3)
- Logic and Foundations (3)
- Algebra (2)
-
- Computer and Systems Architecture (2)
- Digital Communications and Networking (2)
- Other Mathematics (2)
- Analysis (1)
- Architecture (1)
- Computer Sciences (1)
- Discrete Mathematics and Combinatorics (1)
- Electrical and Computer Engineering (1)
- Environmental Design (1)
- Geographic Information Sciences (1)
- Geography (1)
- Hardware Systems (1)
- Mechanical Engineering (1)
- Other Architecture (1)
- Other Computer Sciences (1)
- Other Engineering (1)
- Set Theory (1)
- Social and Behavioral Sciences (1)
- Urban, Community and Regional Planning (1)
- Institution
- Keyword
-
- AERO (1)
- Actions (1)
- Cassandra (1)
- Citizen (1)
- Cluster (1)
-
- Communication (1)
- Community (1)
- Computational actions (1)
- Cryptography (1)
- Data (1)
- Data storage (1)
- Digital forensics (1)
- Display calculus (1)
- Dynamic epistemic logic (1)
- Fault-tolerant (1)
- Fiber (1)
- Forensic data acquisition (1)
- Fuzzy model (1)
- Fuzzy sets (1)
- Fuzzy soft sets (1)
- GIS (1)
- Green infrastructure (1)
- Information (1)
- Informational processing (1)
- Intuitionistic fuzzy sets (1)
- Intuitionistic fuzzy soft sets (1)
- Lightweight (1)
- Malware detection (1)
- Matrices (1)
- Mobile (1)
- Publication
Articles 1 - 9 of 9
Full-Text Articles in Other Computer Engineering
Instructions-Based Detection Of Sophisticated Obfuscation And Packing, Moustafa Saleh, Edward Paul Ratazzi, Shouhuai Xu
Instructions-Based Detection Of Sophisticated Obfuscation And Packing, Moustafa Saleh, Edward Paul Ratazzi, Shouhuai Xu
Electrical Engineering and Computer Science - All Scholarship
Every day thousands of malware are released online. The vast majority of these malware employ some kind of obfuscation ranging from simple XOR encryption, to more sophisticated anti-analysis, packing and encryption techniques. Dynamic analysis methods can unpack the file and reveal its hidden code. However, these methods are very time consuming when compared to static analysis. Moreover, considering the large amount of new malware being produced daily, it is not practical to solely depend on dynamic analysis methods. Therefore, finding an effective way to filter the samples and delegate only obfuscated and suspicious ones to more rigorous tests would significantly …
Foss Big Data Storage Solution, Nurdeen Salami
Foss Big Data Storage Solution, Nurdeen Salami
STAR Program Research Presentations
NASA projects require a reliable approach to store large volumes of data. Accordingly, it is crucial to adopt a lightweight, reliable, and scalable database. Current NASA databases bear costly license fees with undesirable speed and flexibility. The purpose of utilizing the AERO Institute as an IT test bed, or “Sandbox,” is to design, build, test, and implement software solutions prior to transfer to NASA projects. Cassandra coupled with the Astyanax API is a viable solution for storing big data. Store a minimum of 2GB of C-FOSS data in multiple file formats (.csv, .log, .xml, and .jpg). Use benchmark tests to …
Volunteered Geographical Information: An Alternative Solution For Overcoming The Chasm Between Stormwater Management And Community Participation, Yanfu Zhou
Community and Regional Planning Program: Theses and Student Projects
It is a dramatic challenge to promote public engagement in stormwater management and green infrastructure initiatives. When traditional outreach approaches made important influence on public engagement, their limitations are also obvious. With the development of Web 2.0 technology, Volunteered Geographic Information (VGI) has been emerging as one of the most important user-generated geographic contents. The crowdsourcing data that generated by volunteers through geo-web, smartphones, and other geo-devices provides invaluable mass data for decision-making. VGI can provide a better understanding of planning issues and other challenges. The research aims to develop a mobile information platform to allow citizens to report the …
Computational-Communicative Actions Of Informational Processing, Florentin Smarandache, Stefan Vladutescu
Computational-Communicative Actions Of Informational Processing, Florentin Smarandache, Stefan Vladutescu
Branch Mathematics and Statistics Faculty and Staff Publications
This study is circumscribed to the Information Science. The zetetic aim of research is double: a) to define the concept of action of informational processing and b) to design a taxonomy of actions of informational processing. First, the investigation trays to demonstrate that the computational actions of informational processing or the informational actions are computational-investigative configurations for structuring information: clusters of highly-aggregated operations which are carried out in a unitary manner operate convergently and behave like a unique computational device. From a methodological point of view, they are comprised within the category of analytical instruments for the informational processing of …
A Regression Approach To Execution Time Estimation For Programs Running On Multicore Systems, Mohammad Alshamlan
A Regression Approach To Execution Time Estimation For Programs Running On Multicore Systems, Mohammad Alshamlan
FIU Electronic Theses and Dissertations
Execution time estimation plays an important role in computer system design. It is particularly critical in real-time system design, where to meet a deadline can be as important as to ensure the logical correctness of a program. To accurately estimate the execution time of a program can be extremely challenging, since the execution time of a program varies with inputs, the underlying computer architectures, and run-time dynamics, among other factors. The problem becomes even more challenging as computing systems moving from single core to multi-core platforms, with more hardware resources shared by multiple processing cores.
The goal of this research …
Distance In Matrices And Their Applications To Fuzzy Models And Neutrosophic Models, Florentin Smarandache, W.B. Vasantha Kandasamy, K. Ilanthenral
Distance In Matrices And Their Applications To Fuzzy Models And Neutrosophic Models, Florentin Smarandache, W.B. Vasantha Kandasamy, K. Ilanthenral
Branch Mathematics and Statistics Faculty and Staff Publications
In this book authors for the first time introduce the notion of distance between any two m n matrices. If the distance is 0 or m n there is nothing interesting. When the distance happens to be a value t; 0 < t < m n the study is both innovating and interesting. The three cases of study which is carried out in this book are 1. If the difference between two square matrices is large, will it imply the eigen values and eigen vectors of those matrices are distinct? Several open conjectures in this direction are given. 2. The difference between parity check matrix and the generator matrix for the same C(n, k) code is studied. This will help in detecting errors in storage systems as well as in cryptography.
New Operations On Intuitionistic Fuzzy Soft Sets Based On First Zadeh's Logical Operators, Florentin Smarandache, Said Broumi, Pinaki Majumdar
New Operations On Intuitionistic Fuzzy Soft Sets Based On First Zadeh's Logical Operators, Florentin Smarandache, Said Broumi, Pinaki Majumdar
Branch Mathematics and Statistics Faculty and Staff Publications
In this paper , we have defined First Zadeh’s implication , First Zadeh’s intuitionistic fuzzy conjunction and intuitionistic fuzzy disjunction of two intuitionistic fuzzy soft sets and some their basic properties are studied with proofs and examples.
A Study Of Forensic Imaging In The Absence Of Write-Blockers, Gary C. Kessler, Gregory H. Carlton
A Study Of Forensic Imaging In The Absence Of Write-Blockers, Gary C. Kessler, Gregory H. Carlton
Security Studies & International Affairs - Daytona Beach
"Best practices in digital forensics demand the use of write-blockers when creating forensic images of digital media, and this has been a core tenet of computer forensics training for decades. The practice is so ingrained that the integrity of images created without a write-blocker are immediately suspect. This paper describes a research framework that compares forensic images acquired with and without utilizing write-blockers in order to understand the extent of the differences, if any, in the resultant forensic copies. We specifically address whether differences are superficial or evidentiary, and we discuss the impact of admitting evidence acquired without write blocking. …
A Proof-Theoretic Semantic Analysis Of Dynamic Epistemic Logic, Sabine Frittella, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano, Vlasta Sikimić
A Proof-Theoretic Semantic Analysis Of Dynamic Epistemic Logic, Sabine Frittella, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano, Vlasta Sikimić
Engineering Faculty Articles and Research
The present paper provides an analysis of the existing proof systems for dynamic epistemic logic from the viewpoint of proof-theoretic semantics. Dynamic epistemic logic is one of the best known members of a family of logical systems which have been successfully applied to diverse scientific disciplines, but the proof theoretic treatment of which presents many difficulties. After an illustration of the proof-theoretic semantic principles most relevant to the treatment of logical connectives, we turn to illustrating the main features of display calculi, a proof-theoretic paradigm which has been successfully employed to give a proof-theoretic semantic account of modal and substructural …