180 resultados para Islam.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the detection techniques of anomalous programs based on the analysis of their system call traces. We collect the API calls for the tested executable programs from Microsoft detour system and extract the features for our classification task using the previously established n-gram technique. We propose three different feature extraction approaches in this paper. These are frequency-based, time-based and a hybrid approach which actually combines the first two approaches. We use the well-known classifier algorithms in our experiments using WEKA interface to classify the malicious programs from the benign programs. Our empirical evidence demonstrates that the proposed feature extraction approaches can detect malicious programs over 88% which is quite promising for the contemporary similar research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spam or unwanted email is one of the potential issues of Internet security and classifying user emails correctly from penetration of spam is an important research issue for anti-spam researchers. In this paper we present an effective and efficient spam classification technique using clustering approach to categorize the features. In our clustering technique we use VAT (Visual Assessment and clustering Tendency) approach into our training model to categorize the extracted features and then pass the information into classification engine. We have used WEKA (www.cs.waikato.ac.nz/ml/weka/) interface to classify the data using different classification algorithms, including tree-based classifiers, nearest neighbor algorithms, statistical algorithms and AdaBoosts. Our empirical performance shows that we can achieve detection rate over 97%.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Reporting Diversity Project provides teaching materials on reporting cultural diversity for journalism educators and university students. This article reports the findings from a survey designed to gauge journalism educators' awareness of the online curriculum resources and their views on the usefulness of these materials. The survey was also used to capture journalism academics' views on educational resources produced with government support. This article includes the findings from a series of trials of the Reporting Diversity teaching resources with a small cohort of academics from throughout Australia. It includes their evaluation of the resources and reveals ways in which the modules are being used and adapted for different classroom settings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates the human rights performance reporting practices of the top 50 Australian financial service companies listed in the Australian Stock Exchange. All corporate reporting media, including annual reports, Social Responsibility Reports (CSR) and company websites, were reviewed to document their disclosure practices for the current period (2009/2010). In considering a number of international voluntary guidelines on human rights, a content analysis instrument containing 80 specific human rights themes, under 10 general categories, was developed to examine corporate reporting media. The results remain intensely unimpressive. The number of companies that disclosed human rights items is extremely low; the majority of the items were not disclosed by any of the companies under investigation. However, compared to CSR reports and company websites, annual reports were the preferable media used to disclose human rights issues. The result indicates how ineffective the voluntary global guidelines are in ensuring that Australian financial corporations report on their human rights performances.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Studies of Australian perceptions of Muslims and Islam tend to be based on research into media representations of these themes. Additionally, most research on attitudes pertaining to social cohesion and security in the post-9/11 environment concentrates on the opinions of minority groups on these matters. The following study is drawn from materials extracted from focus group discussions relating to Islam, multiculturalism and security that took place with 119 Australians from so-called ethnic and religious majority groups (European descended, and identifying with Judaeo-Christian traditions or having no religious affiliation) in selected metropolitan and rural/regional centres of the state of Victoria in 2007–2008. This article is guided by the following research questions: How can ‘mainstream’ Australian attitudes towards Muslims be categorized? What concerns ‘mainstream’ Australians most about Muslims? Can these attitudes be considered to be Islamophobic? If not, how else may we classify these attitudes? Although some participants voiced very strong, critical and at times unflattering and potentially antagonistic opinions of Muslims, most contributors were guardedly optimistic that current tensions with and controversies surrounding Australia’s Muslims would subside, and that Muslims would soon become well established within Australian society, as previous generations of migrants have since World War II.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Development and Religion explores how the world’s five major religions – Hinduism, Buddhism, Judaism, Christianity and Islam – understand and practice ‘development’ through an examination of their sacred texts, social teaching and basic beliefs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It has been argued that an anti-virus strategy based on malware collected at a certain date, will not work at a later date because malware evolves rapidly and an anti-virus engine is faced with a completely new type of executable not as amenable to detection as the first was. In this paper, we test this idea by collecting two sets of malware, the first from 2002 to 2007, the second from 2009 to 2010 to determine how well the anti-virus strategy we developed based on the earlier set [14] will do on the later set. This anti-virus strategy integrates dynamic and static features extracted from the executables to classify malware by distinguishing between families. The resulting classification accuracies are very close for both datasets, with a difference of only 5.4%, the older malware being more accurately classified than the newer malware. This leads us to conjecture that current anti-virus strategies can indeed be modified to deal effectively with new malware.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In today’s high speed networks it is becoming increasingly challenging for network managers to understand the nature of the traffic that is carried in their network. A major problem for traffic analysis in this context is how to extract a concise yet accurate summary of the relevant aggregate traffic flows that are present in network traces. In this paper, we present two summarization techniques to minimize the size of the traffic flow report that is generated by a hierarchical cluster analysis tool. By analyzing the accuracy and compaction gain of our approach on a standard benchmark dataset, we demonstrate that our approach achieves more accurate summaries than those of an existing tool that is based on frequent itemset mining.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates and measures the near end and far end crosstalk in the multiconductor transmission line (MTL) mounted on the PCB by varying the parameters which are associated with physical dimension, characteristic of the substrate and the nature of input signal. With the variation of these factors, the coupling inductance and capacitance vary causing crosstalk. By using the method of moment (MoM), the per unit length parameters are calculated for microstrip lines. Subcircuit model is used to investigate the time domain and frequency domain analysis of near field and far field crosstalk. This parametric investigation is very useful for designing high speed interconnectors on PCB substrates. Some experimental results are presented to validate the analytical findings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It has been argued that an anti-virus strategy based on malware collected at a certain date, will not work at a later date because malware evolves rapidly and an anti-virus engine is then faced with a completely new type of executable not as amenable to detection as the first was.

In this paper, we test this idea by collecting two sets of malware, the first from 2002 to 2007, the second from 2009 to 2010 to determine how well the anti-virus strategy we developed based on the earlier set [18] will do on the later set. This anti-virus strategy integrates dynamic and static features extracted from the executables to classify malware by distinguishing between families. We also perform another test, to investigate the same idea whereby we accumulate all the malware executables in the old and new dataset, separately, and apply a malware versus cleanware classification.

The resulting classification accuracies are very close for both datasets, with a difference of approximately 5.4% for both experiments, the older malware being more accurately classified than the newer malware. This leads us to conjecture that current anti-virus strategies can indeed be modified to deal effectively with new malware.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Networking of computing devices has been going through rapid evolution and thus continuing to be an ever expanding area of importance in recent years. New technologies, protocols, services and usage patterns have contributed to the major research interests in this area of computer science. The current special issue is an effort to bring forward some of these interesting developments that are being pursued by researchers at present in different parts of the globe. Our objective is to provide the readership with some insight into the latest innovations in computer networking through this. This Special Issue presents selected papers from the thirteenth conference of the series (ICCIT 2010) held during December 23-25, 2010 at the Ahsanullah University of Science and Technology. The first ICCIT was held in Dhaka, Bangladesh, in 1998. Since then the conference has grown to be one of the largest computer and IT related research conferences in the South Asian region, with participation of academics and researchers from many countries around the world. Starting in 2008 the proceedings of ICCIT are included in IEEExplore. In 2010, a total of 410 full papers were submitted to the conference of which 136 were accepted after reviews conducted by an international program committee comprising 81 members from 16 countries. This was tantamount to an acceptance rate of 33%. From these 136 papers, 14 highly ranked manuscripts were invited for this Special Issue. The authors were advised to enhance their papers significantly and submit them to undergo review for suitability of inclusion into this publication. Of those, eight papers survived the review process and have been selected for inclusion in this Special Issue. The authors of these papers represent academic and/or research institutions from Australia, Bangladesh, Japan, Korea and USA. These papers address issues concerning different domains of networks namely, optical fiber communication, wireless and interconnection networks, issues related to networking hardware and software and network mobility. The paper titled “Virtualization in Wireless Sensor Network: Challenges and Opportunities” argues in favor of bringing in different heterogeneous sensors under a common virtual framework so that the issues like flexibility, diversity, management and security can be handled practically. The authors Md. Motaharul Islam and Eui-Num Huh propose an architecture for sensor virtualization. They also present the current status and the challenges and opportunities for further research on the topic. The manuscript “Effect of Polarization Mode Dispersion on the BER Performance of Optical CDMA” deals with impact of polarization mode dispersion on the bit error rate performance of direct sequence optical code division multiple access. The authors, Md. Jahedul Islam and Md. Rafiqul Islam present an analytical approach toward determining the impact of different performance parameters. The authors show that the bit error rate performance improves significantly by the third order polarization mode dispersion than its first or second order counterparts. The authors Md. Shohrab Hossain, Mohammed Atiquzzaman and William Ivancic of the paper “Cost and Efficiency Analysis of NEMO Protocol Entities” present an analytical model for estimating the cost incurred by major mobility entities of a NEMO. The authors define a new metric for cost calculation in the process. Both the newly developed metric and the analytical model are likely to be useful to network engineers in estimating the resource requirement at the key entities while designing such a network. The article titled “A Highly Flexible LDPC Decoder using Hierarchical Quasi-Cyclic Matrix with Layered Permutation” deals with Low Density Parity Check decoders. The authors, Vikram Arkalgud Chandrasetty and Syed Mahfuzul Aziz propose a novel multi-level structured hierarchical matrix approach for generating codes of different lengths flexibly depending upon the requirement of the application. The manuscript “Analysis of Performance Limitations in Fiber Bragg Grating Based Optical Add-Drop Multiplexer due to Crosstalk” has been contributed by M. Mahiuddin and M. S. Islam. The paper proposes a new method of handling crosstalk with a fiber Bragg grating based optical add drop multiplexer (OADM). The authors show with an analytical model that different parameters improve using their proposed OADM. The paper “High Performance Hierarchical Torus Network Under Adverse Traffic Patterns” addresses issues related to hierarchical torus network (HTN) under adverse traffic patterns. The authors, M.M. Hafizur Rahman, Yukinori Sato, and Yasushi Inoguchi observe that dynamic communication performance of an HTN under adverse traffic conditions has not yet been addressed. The authors evaluate the performance of HTN for comparison with some other relevant networks. It is interesting to see that HTN outperforms these counterparts in terms of throughput and data transfer under adverse traffic. The manuscript titled “Dynamic Communication Performance Enhancement in Hierarchical Torus Network by Selection Algorithm” has been contributed by M.M. Hafizur Rahman, Yukinori Sato, and Yasushi Inoguchi. The authors introduce three simple adapting routing algorithms for efficient use of physical links and virtual channels in hierarchical torus network. The authors show that their approaches yield better performance for such networks. The final title “An Optimization Technique for Improved VoIP Performance over Wireless LAN” has been contributed by five authors, namely, Tamal Chakraborty, Atri Mukhopadhyay, Suman Bhunia, Iti Saha Misra and Salil K. Sanyal. The authors propose an optimization technique for configuring the parameters of the access points. In addition, they come up with an optimization mechanism in order to tune the threshold of active queue management system appropriately. Put together, the mechanisms improve the VoIP performance significantly under congestion. Finally, the Guest Editors would like to express their sincere gratitude to the 15 reviewers besides the guest editors themselves (Khalid M. Awan, Mukaddim Pathan, Ben Townsend, Morshed Chowdhury, Iftekhar Ahmad, Gour Karmakar, Shivali Goel, Hairulnizam Mahdin, Abdullah A Yusuf, Kashif Sattar, A.K.M. Azad, F. Rahman, Bahman Javadi, Abdelrahman Desoky, Lenin Mehedy) from several countries (Australia, Bangladesh, Japan, Pakistan, UK and USA) who have given immensely to this process. They have responded to the Guest Editors in the shortest possible time and dedicated their valuable time to ensure that the Special Issue contains high-quality papers with significant novelty and contributions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes a multilayer localized surface plasmon resonance (LSPR) graphene biosensor that includes a layer of graphene sheet on top of the gold layer, and the use of different coupled configuration of a laser beam. The study also investigates the enhancement of the sensitivity and detection accuracy of the biosensor through monitoring biomolecular interactions of biotin-streptavidin with the graphene layer on the gold thin film. Additionally, the role of thin films of gold, silver, copper and aluminum in the performance of the biosensor is separately investigated for monitoring the binding of streptavidin to the biotin groups. The performance of the LSPR graphene biosensor is theoretically and numerically assessed in terms of sensitivity, adsorption efficiency, and detection accuracy under varying conditions, including the thickness of biomolecule layer, number of graphene layers and operating wavelength. Enhanced sensitivity and improved adsorption efficiency are obtained for the LSPR graphene biosensor in comparison with its conventional counterpart; however, detection accuracy under the same resonance condition is reduced by 5.2% with a single graphene sheet. This reduction in detection accuracy (signal to noise ratio) can be compensated for by introducing an additional layer of silica doped B2O3 (sdB2O3) placed under the graphene layer. The role of prism configuration, prism angle and the interface medium (air and water) is also analyzed and it is found that the LSPR graphene biosensor has better sensitivity with triangular prism, higher prism angle, lower operating wavelength and larger number of graphene layers. The approach involves a plot of a reflectivity curve as a function of the incidence angle. The outcomes of this investigation highlight the ideal functioning condition corresponding to the best design parameters.