In this paper, we have developed a chirped-pulse Er-doped all-fiber ultrashort pulse (USP) laser suitable for high-resolution Raman distributed temperature sensor (RDTS) system application. Chirped-pulse regime which ...
详细信息
ISBN:
(数字)9781510634121
ISBN:
(纸本)9781510634121
In this paper, we have developed a chirped-pulse Er-doped all-fiber ultrashort pulse (USP) laser suitable for high-resolution Raman distributed temperature sensor (RDTS) system application. Chirped-pulse regime which is determined by the positive net-cavity dispersion of +0.12 ps(2) allows us to increase the energy of the pulses for effective signal-to-noise ratio in receiving system. It also helps to avoid the influence most of nonlinear effects due to relatively long pulses duration of similar to 24.6 ps. The average power of the pulses is estimated to be similar to 1 mW from master oscillator, and currently increased up to similar to 15 mW by power amplifier. A relatively low repetition rate of similar to 7.925 MHz with signal-to-noise ratio similar to 69 dB was achieved using the resonator length of similar to 25.6 m. To characterize short-term stability of the obtained regime we have also measured the relative intensity noise of the laser, which is < -107 dBc/Hz in the range of 3 Hz - 1 000 kHz.
Return-Oriented programming (ROP) is a robust attack which has been proven to be Turing-complete. ROP reuses code segments named gadget in vulnerable applications and modifies control flow to achieve malicious attacks...
详细信息
ISBN:
(纸本)9783030346362;9783030346379
Return-Oriented programming (ROP) is a robust attack which has been proven to be Turing-complete. ROP reuses code segments named gadget in vulnerable applications and modifies control flow to achieve malicious attacks. Existing defense techniques for code reuse attacks attempt to restrict the policy of control flow transfer (e.g. CFI) or make locating gadgets a hard work (e.g. ASLR). However, decades of the arm race proved the ability to detect up-to-date attacks remains the Achille's heel. In honeypot, a general pattern for operators is spreading honeytokens and hunting spammers by capturing their malicious behavior. In order to capture the attack pattern of code reuse attacks, we present a novel deception based ROP detection model named HoneyGadget. HoneyGadget inserts various types of honey gadgets as tokens to some specific points of binary files where normal control flow would not reach and record their places once the application is loaded. During the execution, HoneyGadget uses Last Branch Record (LBR) to trace execution records. On performing a sensitive function call, HoneyGadget compares LBR records with the maintained address list, and terminates the program immediately if some records match. Since these honey gadgets will not be executed by normal control flow, there must be a ROP attack. We have developed a fully functioning prototype of HoneyGadget. Our evaluation results show that HoneyGadget can (1) capture ROP attacks actively and (2) incurs an acceptable overhead of 7.61%.
Dynamic pricing strategy is a pricing strategy that is often applied by hotels to maximize their income. The purpose of this study is to provide a pricing policy proposal in accordance with dynamic pricing models. Thi...
Dynamic pricing strategy is a pricing strategy that is often applied by hotels to maximize their income. The purpose of this study is to provide a pricing policy proposal in accordance with dynamic pricing models. This study provides a dynamic pricing model that has been adapted to the problems that exist in hotels with various types of rooms. This research consists of three stages, the first phase is predicting future demand. The second stage applying revenue management tools, namely dynamic pricing, to model the effect of prices on demand. Prices change dynamically based on the number of requests available. The third stage is using a nonlinearprogramming approach to maximize revenue. Forecast parameters and dynamic pricing models are estimated using historical sales data for one of the hotels in Bandung, West Java, Indonesia. The results suggest a pricing policy for superior and deluxe room types that can increase revenue by 27% more than the existing pricing policy. The proposed pricing policy is able to complete the method void in determining prices. In addition, the results of this study provide optimal room rates every day along the planning horizon.
Searching is a common process performed by many computer users, Raita algorithm is one algorithm that can be used to match and find information in accordance with the patterns entered. Raita algorithm applied to the f...
详细信息
Searching is a common process performed by many computer users, Raita algorithm is one algorithm that can be used to match and find information in accordance with the patterns entered. Raita algorithm applied to the file search application using java programming language and the results obtained from the testing process of the file search quickly and with accurate results and support many data types.
A rapidly changing information technology industry and the economy are challenging educators to select and competently use the most appropriate learning resources. Many research studies report on the way we learn best...
详细信息
ISBN:
(纸本)9781450365253
A rapidly changing information technology industry and the economy are challenging educators to select and competently use the most appropriate learning resources. Many research studies report on the way we learn best, but most professional educators are generally uninformed concerning both the results of such studies and the value of heads-on and hands-on learning. Wasted resources, learner apathy, and discouragement are often experienced when suitable, interactive teaching methods are not appropriately applied. The challenge is to retain the student's attention, while communicating subject related information. In recent years, board games have been used to a limited extend in corporate settings, but most educators are not aware of the value and the effect of board games designed for learning. Interactive and engaging learning methods like board games provide immediate feedback through discussion with other players with emphasis on hands-on and heads-on activities. The aim of this study is to investigate board games as a method to improve students' knowledge about the Java programming language as seen from the lecturer's viewpoint. This study claims that board games can be used as inexpensive, interactive engagement learning methods to stimulate hands-on and heads-on activities. The results of this study are very important especially for developing countries that cannot afford expensive materials to make students mentally and physically active.
In an IT and software industry, new and improved technologies are always on the rise. We have to keep ourselves updated with these innovations, in order to develop an effective product for commercial use. On the "...
详细信息
ISBN:
(纸本)9781538608074
In an IT and software industry, new and improved technologies are always on the rise. We have to keep ourselves updated with these innovations, in order to develop an effective product for commercial use. On the "world wide web", an application is interconnected with various services and plug-ins, making it necessary for the application to be compatible with maximum technologies. Working in Server Development department, we have a more crucial role to play to ensure an application's efficient working, as almost all of them, today, is online. We discuss here, various technologies used in different projects from cloud services to application programming.
This study used optimization via ABC-PSO mixed coding to solve problems involving mixed integer nonlinearprogramming (MINLP) and mixed integer linear programming (MIILP). The combination of ABC (Artificial Bee Colony...
详细信息
ISBN:
(纸本)9781450364126
This study used optimization via ABC-PSO mixed coding to solve problems involving mixed integer nonlinearprogramming (MINLP) and mixed integer linear programming (MIILP). The combination of ABC (Artificial Bee Colony) and PSO (Particle Swarm Optimization) is assessed with reference to seven benchmark problem tests. The A algorithm was then tested and analyzed. The proposed approach is shown to compare favorably with other established meta-heuristic techniques on the basis of the results provided in this study. This study also considers the specific attributes of the ABC-PSO algorithm with a focus on the potential consequences of application for actual constrained optimization.
Acoustic source localization (ASL) in a structure by analyzing the recorded signals at the receivers is an important process in nondestructive testing for various applications. In spite of recent research advances on ...
详细信息
Data-driven approaches are well suited to represent human motion because arbitrary complex trajectories can be captured. Gaussian process state space models allow to encode human motion while quantifying uncertainty d...
详细信息
Data-driven approaches are well suited to represent human motion because arbitrary complex trajectories can be captured. Gaussian process state space models allow to encode human motion while quantifying uncertainty due to missing data. Such human motion models are relevant for many application domains such as learning by demonstration and motion prediction in human-robot collaboration. For goal-directed tasks it is essential to impose stability constraints on the model representing the human motion. Motivated by learning by demonstration applications, this paper proposes an uncertainty-based control Lyapunov function approach for goal-directed path tracking. We exploit the model fidelity which is related to the location of the training and test data: Our approach actively strives into regions with more demonstration data and thus higher model certainty. This achieves accurate reproduction of the human motion independent of the initial condition and we show that generated trajectories are uniformly globally asymptotically stable. The approach is validated in a nonlinear learning by demonstration task where human-demonstrated motions are reproduced by the learned dynamical system, and higher precision than competitive state of the art methods is achieved. (C) 2019, IFAC (international Federation of Automatic Control) Hosting by Elsevier Ltd. All rights reserved.
In this paper, we further develop recent results in the numerical solution of Hamiltonian partial differential equations (PDEs) (Brugnano et al., 2015), by means of energy-conserving methods in the class of Line Integ...
详细信息
In this paper, we further develop recent results in the numerical solution of Hamiltonian partial differential equations (PDEs) (Brugnano et al., 2015), by means of energy-conserving methods in the class of Line Integral Methods, in particular, the Runge-Kutta methods named Hamiltonian Boundary Value Methods (HBVMs). We shall use HBVMs for solving the nonlinear Schrodinger equation (NLSE), of interest in many applications. We show that the use of energy-conserving methods, able to conserve a discrete counterpart of the Hamiltonian functional, confers more robustness on the numerical solution of such a problem. (C) 2017 Elsevier Inc. All rights reserved.
暂无评论