The utilization of natural resources and the environment to improve the community's welfare is an unavoidable choice. The environment used should still protect the environment. This study aims to provide an overvi...
详细信息
Malaria can be difficult to detect from thin blood smears. Image recognition methods such as convolutional neural network can be used to detect malaria, but the training process takes a long time. Previous research cr...
详细信息
Despite being an efficient bioremediation agent, aquatic biofilm's usefulness as a biomonitor has not been explored extensively. This study disclosed the potential of epilithic biofilm as biomonitor by comparing i...
详细信息
Data is becoming a new resource with high value, so many parties are interested in owning it. There are many ways to take it, one of which is planting and spreading malware known as stealer malware. Over time, malware...
Data is becoming a new resource with high value, so many parties are interested in owning it. There are many ways to take it, one of which is planting and spreading malware known as stealer malware. Over time, malware has become more sophisticated, targeted, complex, commercialized, and scalable for a wider range of attacks. This makes malware analysis an important job requiring a lot of time, expertise, and extensive knowledge, both by individuals and teams of analysts. This study will analyze stealer malware using three analytical methods: surface, runtime, and static code. In malware analysis using the surface method, malware is tested by scanning by antivirus, hashing malware, and package/obfuscated detection, followed by Portable Executable analysis and malware sandbox analysis. In the runtime method, the malware is run for further observations of registry changes, DNS activity observations, and network data communication activities. In research using the static code analysis method, tests were carried out to find the relationship between the use of linked libraries and functions, string search as a guide for working steps of malware, and debugging malware to explore deeper into malware behaviour. The results obtained are information about the characteristics of the malware stealer and its impact on the test environment.
This study aims to analyze the validity and effectiveness of the hairpiece module. The research method used is development or known as the Research and Development method. The stages in the research process are the an...
详细信息
Theionarchaea is a recently described archaeal class within the *** it is widely distributed in sediment ecosystems,little is known about its metabolic potential and ecological ***,we used metagenomics and metatranscr...
详细信息
Theionarchaea is a recently described archaeal class within the *** it is widely distributed in sediment ecosystems,little is known about its metabolic potential and ecological ***,we used metagenomics and metatranscriptomics to characterize 12 theionarchaeal metagenome-assembled genomes,which were further divided into two subgroups,from coastal mangrove sediments of China and seawater columns of the Yap *** analysis revealed that apart from the canonical sulfhydrogenase,Theionarchaea harbor genes encoding heliorhodopsin,group 4[NiFe]-hydrogenase,and flagellin,in which genes for heliorhodopsin and group 4[NiFe]-hydrogenase were transcribed in mangrove ***,the theionarchaeal substrate spectrum may be broader than previously reported as revealed by metagenomics and metatranscriptomics,and the potential carbon substrates include detrital proteins,hemicellulose,ethanol,and CO_(2).The genes for organic substrate metabolism(mainly detrital protein and amino acid metabolism genes)have relatively higher transcripts in the top sediment layers in mangrove *** addition,co-occurrence analysis suggested that the degradation of these organic compounds by Theionarchaea might be processed in syntrophy with fermenters(e.g.,Chloroflexi)and ***,these observations expand the current knowledge of the metabolic potential of Theionarchaea,and shed light on the metabolic strategies and roles of these archaea in the marine ecosystems.
This research aims to: 1) know the formulation of pomade making from aromatic pandan wangi leaf essential oil, 2) know the characteristics of pomade from the essential oil of pandan wangi leaves, and 3) know the quali...
详细信息
The foundation erection work is a job that has a high enough complexity. In making the decision of the type of pile and the method of erection, practitioners have many choices with various conditions in the field. Dec...
详细信息
This study focused on the modulus of rupture (MOR) for high strength self-compacting concrete (SCC) using varied metakaolin (MK) composition. The MOR significantly contributes to the resilience and mechanical performa...
详细信息
One evidence of environmental pollution is the formation of acid mine drainage. In passive processing systems, the technique that is often used is phytoremediation because the costs incurred for this method are afford...
详细信息
暂无评论