We have designed an anti-plagiarism software to detect plagiarism in students' assignments, especially written assignments, homework, and research reports, which will hereinafter be collectively ...referred to as student work. We used our university network to gather student work to detect plagiarism. . To collect data, we used a domain name system to store the student work data based on the respective location, time, and the subject on which each student was assigned work. Once the student work data were collected, they were sent to an extraction module to remove unwanted data. The remaining data were then fed to a similarity index module, which produced similarity values based on comparisons between the collected data and the student work. This module uses mathematical equations that are built using semantic and syntactic similarity reports. Furthermore, in this study, we recommended procedures that can be applied to avoid plagiarism using the programming approach. This approach can raise awareness of plagiarism among students and encourage them to generate innovative ideas instead of plagiarizing. To attract faculty members to use the software, promotional materials can be customized based on the actual control factors that directly affect their adoption of the software. For example, the campaign should provide information highlighting the ease of implementation of the software for senior faculty members.
In response to the volume and sophistication of malicious software or malware, security investigators rely on dynamic analysis for malware detection to thwart obfuscation and packing issues. Dynamic ...analysis is the process of executing binary samples to produce reports that summarise their runtime behaviors. The investigator uses these reports to detect malware and attribute threat types leveraging manually chosen features. However, the diversity of malware and the execution environments make manual approaches not scalable because the investigator needs to manually engineer fingerprinting features for new environments. In this paper, we propose, MalDy (mal die), a portable (plug and play) malware detection and family threat attribution framework using supervised machine learning techniques. The key idea of MalDy portability is the modeling of the behavioral reports into a sequence of words, along with advanced natural language processing (NLP) and machine learning (ML) techniques for automatic engineering of relevant security features to detect and attribute malware without the investigator intervention. More precisely, we propose to use bag-of-words (BoW) NLP model to formulate the behavioral reports. Afterward, we build ML ensembles on top of BoW features. We extensively evaluate MalDy on various datasets from different platforms (Android and Win32) and execution environments. The evaluation shows the effectiveness and the portability of MalDy across the spectrum of the analyses and settings.
실제 적용 타당성 탐색을 위한 고전적 상호배제 알고리즘 성능 평가 이형봉; Hyung-bong Lee; 권기현 ...
정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템,
12/2017, Letnik:
6, Številka:
12
Journal Article
Odprti dostop
상호배제는 원래 다중처리기 시스템을 지원하는 운영체제의 경쟁상황 예방 이론에서 출발하였으나, 최근에는 다중코어처리기의 일반화로 그 적용범위가 급격하게 병렬처리 어플리케이션 영역으로 이동되었다. POSIX 스레드, WIN32 스레드, Java 스레드 등이 대표적인 병렬 처리 어플리케이션 개발환경인데, 이들은 각자 고유한 상호배제 메커니즘을 제공하고 있다. ...이들 환경에서 성능에 매우 민감한 어플리케이션들은 코딩의 불편함 등 약간의 희생을 감수하더라도 상호배제를 위한 부담 경감을 필요로 할 수 있다. 이 연구에서는 두 스레드 사이에서 Dekker와 Peterson 알고리즘을 플랫폼별로 바쁜 대기와 처리기 양보 형태로 구현하여 각각의 고유 상호배제 메커니즘들과의 성능을 비교하고, 그 알고리즘들의 유용성을 평가한다. 분석 결과 POSIX 및 WIN32 스레드 환경에서 처리기 양보 형 Dekker 알고리즘이 최소 2배에서 최대 70배까지 우수한 것으로 나타나 이 알고리즘의 실용성이 충분한 것으로 확인되었다.
The mutual exclusion is originally based on the theory of race condition prevention in symmetric multi-processor operating systems. But recently, due to the generalization of multi-core processors, its application range has been rapidly shifted to parallel processing application domain. POSIX thread, WIN32 thread, and Java thread, which are typical parallel processing application development environments, provide a unique mutual exclusion mechanism for each of them. Applications that are very sensitive to performance in these environments may want to reduce the burden of mutual exclusion, even at some cost, such as inconvenience of coding. In this study, we implement Dekker's and Peterson's algorithm in the form of busy-wait and processor-yield in various platforms, and compare the performance of them with the built-in mutual exclusion mechanisms to evaluate the usability of the classic algorithms. The analysis result shows that Dekker's algorithm of processor-yield type is superior to the built-in mechanisms in POSIX and WIN32 thread environments at least 2 times and up to 70 times, and confirms that the practicality of the algorithm is sufficient.
This paper present a search algorithm based on priority to detect malicious behavior in the semantic method with respect to morph technology in computer viruses. For Win32 PE virus, use disassembly ...technologies to get the assembly code of the program, and then establish the program flow chart with help of the intermediate representation. Next, match the malicious behavior template with the program flow chart. Search algorithm based on priority is used to find def-use relationship for detecting malicious behavior. The experiment results show that the search algorithm is fast and effective for invalid code insertion, code transposition, and register reassignment and partially effective for instruction substitution.
"Assembly Language Programming" is one of the basic courses for students majoring in computer and electronic information. Over the years with the development of computer hardware and software, ...assembly language has undergone major changes from DOS assembly, 80X86 assembly to Win32 assembly. However, as a language closest to the hardware assembly language is complicated in instruction, non-intuitive and to some degree even boring. As a result, students and teachers find it difficult to learn or teach. Thus, in the process of teaching how to accurately clarify the teaching plans and the teaching content, and how to adopt better teaching methods become key issues. Based on the author's long experience in teaching and practice, how to reform the teaching of "Assembly Language Programming" was discussed, particularly the contents of the Win32 assembly.
The increase in complexity of electronic systems has opened the way to the use of different types of operating systems working together. The development of these systems requires simulation ...infrastructures where the entire system, including all its OSs, can be simulated, both for functional verification and performance evaluation. However, the generation of such simulation infrastructures with current technologies usually requires a huge effort that high-level engineers cannot support. In order to solve this problem, the paper presents a solution for simulating systems composed of different kinds of OSs. The approach is based on native simulation and presents an example combining Linux and Win32 systems in a single simulation. This example ensures usability since these are two of the most complex OSs commonly integrated in electronic devices. Nevertheless, the idea can also be extended to support other OSs. As a result, engineers can take advantage of an infrastructure capable of modeling complex architectures with different operating systems requiring relatively little design effort, for early system evaluation at the beginning of the design process.
GPS tracking ship is an automatic equipment used to measure water-depth, which is based on the GPS navigational signals, and the system needs real-time and efficient data acquisition through serial ...ports. The technology of multi-thread serial communication is applied to meet the requirements of the system. In this paper, the application of multi-thread and serial communication based on Win32 API functions is introduced. Meanwhile, a new programming method is developed, considering the specific feature of the system. With the multi-thread serial communication, the program operates steadily in Windows XP system, and has a considerable practical value in application.
AVR-USB data acquisition Lakkoju, N. K.; Gudla, S.; Mantravadi, B. S.
2011 3rd International Conference on Electronics Computer Technology,
2011-April, Letnik:
1
Conference Proceeding
Several industrial operations in monitor control and command applications use data acquisition, where data from the external world is read, processed, used for decisions and, eventually, memorized by ...a digital system. Here data acquisition system with USB interface is considered. Using add-on serial to USB converters, an existing system can be made USB interfaced or the complete system can be redesigned using new generation microcontroller with inbuilt USB hardware stack. This paper describes a low-cost data acquisition system that includes Software-defined open source USB stack over generic ATmega32 microcontroller, having analog channels and digital I/O lines and a temperature sensor. At PC side, GUI application is designed using .NET with Instrumentation Active-x Controls to acquire and monitor data and control all system I/O. The system hardware developed is a low-cost alternative to commercially available systems that use USB controllers. The work has been implemented for temperature sensing and controlling and the results shown currently support the h/w and s/w developed. It can be used for biomedical analysis, industrial temperature loggers, industrial process, instrumentation controls and the like.
The architecture, interface, and functionality of the Windows Application Programming Interface (API) make it difficult to master and use effectively, and contribute negatively to the safety, ...robustness, and portability of the applications developed under it. The API is structured around a large and constantly evolving set of functions and is based on a problematic shared library implementation. The provided interfaces are complicated, nonorthogonal, abuse the type system, cause name-space pollution, and use inconsistent naming conventions. In addition, the functionality of the interface suffers from inconsistency, incompleteness, and inadequate documentation. Application developers, programming tool vendors, and Microsoft should face the above problems and provide appropriate solutions.