Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!

Znaleziono wyników: 4

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
The paper concerns behavioral biometrics, specifically issues related to the verification of the identity of computer systems users based on user profiling. The profiling method for creating a behavioral profile based on multiple aspects of user activity in a computer system is presented. The work is devoted to the analysis of user activity in environments with a graphical user interface GUI. Mouse activity, keyboard and software usage are taken into consideration. Additionally, an attempt to intrusion detection based on the proposed profiling method and statistical measures is performed. Preliminary studies show that the proposed profiling method could be useful in detecting an intruder masquerading as an authorized user of the computer system. This article presents the preliminary research and conclusions.
EN
Cardiovascular mortality remains a leading health and social problem in many countries throughout the world. Its main cause is related to atherosclerosis of coronary and cerebral vessels with their most severe consequences: heart attack and stroke. Therefore, it is obvious that current preventive measures include early detection of atherosclerosis process. Multi-detector computed tomography (MDCT) is one of imaging modalities allowing for noninvasive detection of atherosclerotic lesion within coronary arteries in subjects with accumulation of risk factors (smoking, high lipids, hypertension, male gender, family history) or with suspicion of coronary artery disease (CAD). In is very important that the tomographic images are taken in synchronization with cardiac cycle so that, during few heartbeats, an appropriate series of images can be recorded. Commonly, cardiac MDCT is used for visualization of cardiac and vessels morphology. Heart function can also be determined, however, this MDCT potential is only rarely applied, as current echocardiographic modalities are sufficient. Functional analysis of coronary arteries (flow, reserve) is usually approached by means of invasive procedures. We aimed at finding solution for evaluation of another kind of functional analysis of coronary arteries, namely vessel's wall compliance by means of MDCT coronary angiography. Under the proposed procedure, on basis of serial CT images of the vessels over entire cardiac cycles, the internal area of the blood vessel is measured and its changes during various phases of heartbeat (systole, diastole) are calculated. If the vessel wall has been changed by atherosclerotic plaque, either calcified or non-calcified, then its compliance will be reduced due to its stiffness. Calculation of coronary artery compliance requires a series of measurements, which is unreliable and impractical for doing manually. One component of the method described herein involves the images being converted into binary representations and the Hough Transform then applied. The overall methodology proposed in this paper assists in the preparation of a medical diagnosis.
PL
Artykuł przedstawia podstawowe metody zaciemniania kodu bajtowego przygotowywanego dla maszyny wirtualnej KVM. Szczególna uwaga zostaje zwrócona na metodę leksykograficzną. Następnie przetestowano kilka darmowych narzędzi do zaciemniania. Zauważono, że większość z nich powoduje zmniejszanie rozmiaru zaciemnianych aplikacji.
EN
The article presents essential methods of obfuscation the bytecode prepared for the KVM virtual machine. The special attention is paid to the lexicographical method. Next a few free tools for obfuscation were tested. Authors noticed that the most of them caused reducing the size of obfuscated applications.
PL
Artykuł przedstawia mechanizm pobierania danych wskazanych elementów graficznego interfejsu użytkownika oraz metodę ponownego ich zlokalizowania bez względu na instancję aplikacji. Mechanizm nazwano trwałym przechwytywaniem elementów GUI . Podczas realizacji założono wykorzystanie jedynie funkcji API systemu operacyjnego Windows. Działanie przetestowano na interfejsach graficznych aplikacji systemu Windows oraz platform .NET i Java.
EN
Paper presents a mechanism of collecting data of graphical user interface elements pointed by user as well as method of searching based on collected data. The mechanism was called a permanent capture of GUI elements because it allows to find pointed element independently on application's instance. Task implementation assumed usage of API functions available in Windows operating system without additional, external libraries. Solution was tested with Windows applications as well as .NET and Java platforms.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.