821 research outputs found
Comparative Evaluation of Mobile Forensic Tools
The rapid rise in the technology today has brought to limelight mobile devices which are now being used as a tool to commit crime. Therefore, proper steps need to be ensured for Confidentiality, Integrity, Authenticity and legal acquisition of any form of digital evidence from the mobile devices. This study evaluates some mobile forensic tools that were developed mainly for mobile devices memory and SIM cards. An experiment was designed with five android phones with different Operating System. Four tools were used to find out the capability and efficiency of the tools when used on the sampled phones. This would help the forensic investigator to know the type of tools that will be suitable for each phone to be investigated for acquiring digital evidence. The evaluation result showed that AccessData FTK imager and Paraben device seizure performs better than Encase and Mobiledit. The experimental result shows that, Encase could detect the unallocated space on the mobile deice but could retrieve an deleted data
A Fuzzy Classifier-Based Penetration Testing for Web Applications
The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space. One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers. The second being the estimation and determination of level of risks/threats posed to Web applications by vul- nerabilities obvious to the developer (or tester); this is generally referred to as penetration testing. Recently, there is Vulnerability Assessment and Penetration Testing (VAPT) that combined these two schemes to improve safety and effec- tively combat the menace of attackers on Web applications. This paper proposed Fuzzy Classifier-based Vulnerability and Assessment Testing (FCVAPT) model to provide security for sensitive data/information in Web applications. Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model. FCVAPT model’s classification performance for MSE, MAPE and RMSE were 33.33, 14.81% and 5.77% respectively. FCVAPT is considerably effective for detecting vulnerability and ascertaining the nature of threats/risks available to Web applications
End to End Delay Performance Analysis of Video Conferencing over LTE
Mental development to use the data, such as multimedia, video and online games led to the development of a technique called LTE long term evolution. The goal of this paper is to analyze the quality of service (QoS) performance and its effects when video is streamed over LTE .Using OPNET (Optimized Network Engineering Tool). the performance can be simulated having Different scenarios for video conferencing . in addition to we also measured the performance of packet End-to-End delay
A Fuzzy Classifier-Based Penetration Testing for Web Applications
The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space. One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers. The second being the estimation and determination of level of risks/threats posed to Web applications by vul- nerabilities obvious to the developer (or tester); this is generally referred to as penetration testing. Recently, there is Vulnerability Assessment and Penetration Testing (VAPT) that combined these two schemes to improve safety and effec- tively combat the menace of attackers on Web applications. This paper proposed Fuzzy Classifier-based Vulnerability and Assessment Testing (FCVAPT) model to provide security for sensitive data/information in Web applications. Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model. FCVAPT model’s classification performance for MSE, MAPE and RMSE were 33.33, 14.81% and 5.77% respectively. FCVAPT is considerably effective for detecting vulnerability and ascertaining the nature of threats/risks available to Web applications
Differential Methylation Region Detection Via an Array-Adaptive Normalized Kernelweighted Model
A differentially methylated region (DMR) is a genomic region that has significantly different methylation patterns between biological conditions. Identifying DMRs between different biological conditions is critical for developing disease biomarkers. Although methods for detecting DMRs in microarray data have been introduced, developing methods with high precision, recall, and accuracy in determining the true length of DMRs remains a challenge. In this study, we propose a normalized kernel-weighted model to account for similar methylation profiles using the relative probe distance from nearby CpG sites. We also extend this model by proposing an array-adaptive version in attempt to account for the differences in probe spacing between Illumina\u27s Infinium 450K and EPIC bead array respectively. We also study the asymptotic results of our proposed statistic. We compare our approach with a popular DMR detection method via simulation studies under large and small treatment effect settings. We also discuss the susceptibility of our method in detecting the true length of the DMRs under these two settings. Lastly, we demonstrate the biological usefulness of our method when combined with pathway analysis methods on oral cancer data. We have created an R package called idDMR, downloadable from GitHub repository with link: https:// github.com/DanielAlhassan/idDMR, that allows for the convenient implementation of our array-adaptive DMR method
Protective Community Norms and Mental Health Risks for Severe Physical Abuse: Lessons From a Nationally Representative Study of Ghana
Although it has become axiomatic to quote an African proverb in discussions of child well-being, attempts to draw concrete and positive lessons from how African communities respond to and mitigate child maltreatment are comparatively few. This study tested the hypothesis that the collective value of Abiriwatia in Ghana, which supports legitimate norms of community obligations to care for children, could be protective against physical abuse. It also examined the claim that knowledge of the familial situation of community members, generated through Abiriwatia, may help them to act to mitigate the risk of caregiver’s borderline personality disorder (BPD) features. We obtained a nationally representative sample of 1,100 female caregivers from 22 Ghanaian settlements and tested the hypotheses using multilevel models. Controlling for community-level physical abuse, living in a community with high levels of Abiriwatia childcare and community authority values is associated with lower levels of very severe physical abuse, and Abiriwatia childcare may mitigate risk from the caregiver’s BPD features. Within Ghana, encouraging positive and protective aspects of traditional Ghanaian values and working to reinstate respect for these values may have positive outcomes for children. Interventions to reduce child maltreatment should be developed with reference to Abiriwatia childcare values
Parental education and perception of outdoor playing time for preschoolers
Abstract Aim: The objective of this study was to analyze whether or not socioeconomic positions influence outdoor playtime during the week (WK) and on the weekends (WEND). Methods: The sample consisted of 485 (girls; n=223) healthy preschoolers, aged from 3 to 6 years, enrolled in kindergartens from the metropolitan area of Porto, Portugal. Physical Activity (PA) was assessed for 7 consecutive days with an accelerometer. The time playing outdoors during the WK or the WEND was reported by parents. Anthropometric data (weight and height) was collected following standardized protocols. Socioeconomic position was assessed by Parental Education (PE), according to the Portuguese education system. Results: We found differences in time spent playing outdoors either for the WK or WEND, but not for Total PA (TPA), in both sexes. However, regression analysis showed that after age adjustment, BMI and TPA for both sexes, we only found significant associations between low PE (LPE) and high PE (HPE) groups on WK or WEND. However, we found no statistically significant association for boys on the WK (p=0.06). Conclusion: Our findings suggest that socioeconomic position can influence the children’s time spent in outdoor activities, especially on the weekends. This may have implications for future interventions with this age group
- …
