Práce se zabývá rozborem možností forenzní analýzy při vyšetřování na operačních systémech linux. Použitím distribuce BackTrack a obsažených nástrojů je...
详细信息
Práce se zabývá rozborem možností forenzní analýzy při vyšetřování na operačních systémech linux. Použitím distribuce BackTrack a obsažených nástrojů je provedeno forenzní vyšetřování na testovací instalaci operačního systému Xubuntu. Práce je rozdělena do kapitol, kde postupně popisuje základy operačního systému linux, přes požadavky kladené na vyšetřovatele a jeho vybavení až k seznámení s nástroji používanými na analýzu. Všechny porovnávané nástroje jsou volně dostupné a svou velikostí sahají od jednoduchých nástrojů až po komplexní prostředí. Teoretické poznatky jsou aplikovány na reálný systém, kde je ukázáno použití analyzovaných nástrojů. Práce je zakončena shrnutím nálezů vyšetřování do forenzního posudku.
Modern embedded systems execute applications, which interact with the operatingsystem and hardware differently depending on the type of workload. These cross-layer interactions result in wide variations of the chip-w...
详细信息
Modern embedded systems execute applications, which interact with the operatingsystem and hardware differently depending on the type of workload. These cross-layer interactions result in wide variations of the chip-wide thermal profile. In this article, a reinforcement learning-based runtime manager is proposed that guarantees application-specific performance requirements and controls the POSIX thread allocation and voltage/frequency scaling for energy-efficient thermal management. This controls three thermal aspects: peak temperature, average temperature, and thermal cycling. Contrary to existing learning-based runtime approaches that optimize energy and temperature individually, the proposed runtime manager is the first approach to combine the two objectives, simultaneously addressing all three thermal aspects. However, determining thread allocation and core frequencies to optimize energy and temperature is an NP-hard problem. This leads to exponential growth in the learning table (significant memory overhead) and a corresponding increase in the exploration time to learn the most appropriate thread allocation and core frequency for a particular application workload. To confine the learning space and to minimize the learning cost, the proposed runtime manager is implemented in a two-stage hierarchy: a heuristic-based thread allocation at a longer time interval to improve thermal cycling, followed by a learning-based hardware frequency selection at a much finer interval to improve average temperature, peak temperature, and energy consumption. This enables finer control on temperature in an energy-efficient manner while simultaneously addressing scalability, which is a crucial aspect for multi-/many-core embedded systems. The proposed hierarchical runtime manager is implemented for linux running on nVidia's Tegra SoC, featuring four ARM Cortex-A15 cores. Experiments conducted with a range of embedded and cpu-intensive applications demonstrate that the proposed runti
The Data Platform of Resource and Environment—whose data mainly come from field observation stations,spatial observations,and internet service institutions—is the base of data analysis and model simulation in geosci...
详细信息
The Data Platform of Resource and Environment—whose data mainly come from field observation stations,spatial observations,and internet service institutions—is the base of data analysis and model simulation in geoscience research in *** this integrated data platform,the tasks of the data platform of field observation stations are principally data collection,management,assimilation,and share *** into consideration the distributing characteristics of the data sources and the service objects,the authors formulated the framework of the field observation stations' data platform based on the grid technology and designed its operating *** authors have further defined and analyzed the key functions and implementing techniques for each *** a linux operating system,validation tests for the data platform's function on data replication,data synchronization,and unified data service have been conducted under an environment that of the simulating field stations.
A composition of unfixed video surveillance terminal in view of the hardware platform of S3C2440, and the core of the linux operating system in the article. Design the system's software and hardware platform solut...
详细信息
A composition of unfixed video surveillance terminal in view of the hardware platform of S3C2440, and the core of the linux operating system in the article. Design the system's software and hardware platform solutions, surveillance terminal use RTP protocol to receive H.264 video stream through wireless network. The method of how to deal with the disorder and loss of video packets when the unstable network is proposed. With the help of open source f.f.m. peg library for decoding and displaying the scene of surveillance. The experiments show that surveillance terminal has flexible portable features, for QCIF resolution has better real-time surveillance result.
A smart home control system could link independent electric appliances together 'intelligently' and provide comprehensive,fast and smooth exchange of *** system gives people real-time information control,which...
详细信息
ISBN:
(纸本)9781509011964
A smart home control system could link independent electric appliances together 'intelligently' and provide comprehensive,fast and smooth exchange of *** system gives people real-time information control,which improves their life *** this study,an embedded smart home system based on socket network connections was designed using ARM9 development board and embedded linuxoperating *** system could control all the subsystems that are related with home life,such as light control and sound *** on C/S structure,the designed smart home system has rich hardware and software resources,low cost and low power consumption,as well as easy expansion,update and *** system has practical values.
linux is a comparatively safe operatingsystem. This paper makes a research about the security policy for linux, analyzing the principle and design idea of its identification and authentication mechanism, access contr...
详细信息
linux is a comparatively safe operatingsystem. This paper makes a research about the security policy for linux, analyzing the principle and design idea of its identification and authentication mechanism, access control mechanism, Capability mechanism and security audit system. In this paper, the disadvantages of linuxsystem are pointed out and an improvement program is indicated so that the security performance of this system can be more effectively strengthened.
In this paper,a novel approach for digital image chaotic communication via FPGA embedded Ethernet transmission is *** on Euler algorithm and variable ratio expansion transformation,by C language programming under the ...
详细信息
In this paper,a novel approach for digital image chaotic communication via FPGA embedded Ethernet transmission is *** on Euler algorithm and variable ratio expansion transformation,by C language programming under the linux operating system,the continuous time 8-scroll Chua system is converted to the discrete sequence used to encrypt and decrypt image on the FPGA-based *** to the principle of drivingresponse synchronization,a scheme for chaotic communication of a 512×512BMP static color image is implemented via embedded Ethernet transmission on the FPGA-based platform with XUP Virtex-II Pro ***,the system design,software simulation and hardware implementation results are also given.
linux is a comparatively safe operating *** paper makes a research about the security policy for linux,analyzing the principle and design idea of its identification and authentication mechanism,access control mechanis...
详细信息
linux is a comparatively safe operating *** paper makes a research about the security policy for linux,analyzing the principle and design idea of its identification and authentication mechanism,access control mechanism,Capability mechanism and security audit *** this paper,the disadvantages of linuxsystem are pointed out and an improvement program is indicated so that the security performance of this system can be more effectively strengthened.
暂无评论