CINXE.COM
Search results for: Linux system calls
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Linux system calls</title> <meta name="description" content="Search results for: Linux system calls"> <meta name="keywords" content="Linux system calls"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Linux system calls" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Linux system calls"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 17924</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Linux system calls</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17924</span> The Journey of a Malicious HTTP Request </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Mansouri">M. Mansouri</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Jaklitsch"> P. Jaklitsch</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Teiniker"> E. Teiniker</a> </p> <p class="card-text"><strong>Abstract:</strong></p> SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls" title="Linux system calls">Linux system calls</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20attack%20detection" title=" web attack detection"> web attack detection</a>, <a href="https://publications.waset.org/abstracts/search?q=interception" title=" interception"> interception</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL" title=" SQL "> SQL </a> </p> <a href="https://publications.waset.org/abstracts/13242/the-journey-of-a-malicious-http-request" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17923</span> Linux Security Management: Research and Discussion on Problems Caused by Different Aspects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ma%20Yuzhe">Ma Yuzhe</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linux" title="Linux">Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20management" title=" system management"> system management</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/152889/linux-security-management-research-and-discussion-on-problems-caused-by-different-aspects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17922</span> Bypassing Docker Transport Layer Security Using Remote Code Execution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michael%20J.%20Hahn">Michael J. Hahn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud" title="cloud">cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=Docker" title=" Docker"> Docker</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux" title=" Linux"> Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/103868/bypassing-docker-transport-layer-security-using-remote-code-execution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/103868.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">198</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17921</span> Development of Configuration Software of Space Environment Simulator Control System Based on Linux </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhan%20Haiyang">Zhan Haiyang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhang%20Lei"> Zhang Lei</a>, <a href="https://publications.waset.org/abstracts/search?q=Ning%20Juan"> Ning Juan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a configuration software solution in Linux, which is used for the control of space environment simulator. After introducing the structure and basic principle, it is said that the developing of QT software frame and the dynamic data exchanging between PLC and computer. The OPC driver in Linux is also developed. This driver realizes many-to-many communication between hardware devices and SCADA software. Moreover, an algorithm named “Scan PRI” is put forward. This algorithm is much more optimizable and efficient compared with "Scan in sequence" in Windows. This software has been used in practical project. It has a good control effect and can achieve the expected goal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linux%20OS" title="Linux OS">Linux OS</a>, <a href="https://publications.waset.org/abstracts/search?q=configuration%20software" title=" configuration software"> configuration software</a>, <a href="https://publications.waset.org/abstracts/search?q=OPC%20Server%20driver" title=" OPC Server driver"> OPC Server driver</a>, <a href="https://publications.waset.org/abstracts/search?q=MYSQL%20database" title=" MYSQL database"> MYSQL database</a> </p> <a href="https://publications.waset.org/abstracts/54104/development-of-configuration-software-of-space-environment-simulator-control-system-based-on-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54104.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">288</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17920</span> An Intelligent Nondestructive Testing System of Ultrasonic Infrared Thermal Imaging Based on Embedded Linux</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hao%20Mi">Hao Mi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ming%20Yang"> Ming Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Tian-yue%20Yang"> Tian-yue Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ultrasonic infrared nondestructive testing is a kind of testing method with high speed, accuracy and localization. However, there are still some problems, such as the detection requires manual real-time field judgment, the methods of result storage and viewing are still primitive. An intelligent non-destructive detection system based on embedded linux is put forward in this paper. The hardware part of the detection system is based on the ARM (Advanced Reduced Instruction Set Computer Machine) core and an embedded linux system is built to realize image processing and defect detection of thermal images. The CLAHE algorithm and the Butterworth filter are used to process the thermal image, and then the boa server and CGI (Common Gateway Interface) technology are used to transmit the test results to the display terminal through the network for real-time monitoring and remote monitoring. The system also liberates labor and eliminates the obstacle of manual judgment. According to the experiment result, the system provides a convenient and quick solution for industrial non-destructive testing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=remote%20monitoring" title="remote monitoring">remote monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=non-destructive%20testing" title=" non-destructive testing"> non-destructive testing</a>, <a href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system" title=" embedded Linux system"> embedded Linux system</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title=" image processing"> image processing</a> </p> <a href="https://publications.waset.org/abstracts/101979/an-intelligent-nondestructive-testing-system-of-ultrasonic-infrared-thermal-imaging-based-on-embedded-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101979.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">224</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17919</span> TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sedat%20Aktas">Sedat Aktas</a>, <a href="https://publications.waset.org/abstracts/search?q=Egemen%20Ulusoy"> Egemen Ulusoy</a>, <a href="https://publications.waset.org/abstracts/search?q=Remzi%20Yildirim"> Remzi Yildirim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=linux" title="linux">linux</a>, <a href="https://publications.waset.org/abstracts/search?q=paging" title=" paging"> paging</a>, <a href="https://publications.waset.org/abstracts/search?q=addressing" title=" addressing"> addressing</a>, <a href="https://publications.waset.org/abstracts/search?q=ram-image" title=" ram-image"> ram-image</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20dumping" title=" memory dumping"> memory dumping</a>, <a href="https://publications.waset.org/abstracts/search?q=kernel%20modules" title=" kernel modules"> kernel modules</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic" title=" forensic"> forensic</a> </p> <a href="https://publications.waset.org/abstracts/153801/tactical-ram-image-retrieval-in-linux-using-protected-mode-architectures-paging-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153801.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">117</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17918</span> Stochastic Analysis of Linux Operating System through Copula Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vijay%20Vir%20Singh">Vijay Vir Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work is focused studying the Linux operating system connected in a LAN (local area network). The STAR topology (to be called subsystem-1) and BUS topology (to be called subsystem-2) are taken into account, which are placed at two different locations and connected to a server through a hub. In the both topologies BUS topology and STAR topology, we have assumed n clients. The system has two types of failures i.e. partial failure and complete failure. Further, the partial failure has been categorized as minor and major partial failure. It is assumed that the minor partial failure degrades the sub-systems and the major partial failure make the subsystem break down mode. The system may completely fail due to failure of server hacking and blocking etc. The system is studied using supplementary variable technique and Laplace transform by using different types of failure and two types of repair. The various measures of reliability for example, availability of system, reliability of system, MTTF, profit function for different parametric values have been discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title="star topology">star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20topology" title=" bus topology"> bus topology</a>, <a href="https://publications.waset.org/abstracts/search?q=blocking" title=" blocking"> blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux%20operating%20system" title=" Linux operating system"> Linux operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=supplementary%20variable" title=" supplementary variable"> supplementary variable</a> </p> <a href="https://publications.waset.org/abstracts/48060/stochastic-analysis-of-linux-operating-system-through-copula-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17917</span> A Formal Verification Approach for Linux Kernel Designing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zi%20Wang">Zi Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xinlei%20He"> Xinlei He</a>, <a href="https://publications.waset.org/abstracts/search?q=Jianghua%20Lv"> Jianghua Lv</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuqing%20Lan"> Yuqing Lan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Kernel though widely used, is complicated. Errors caused by some bugs are often costly. Statically, more than half of the mistakes occur in the design phase. Thus, we introduce a modeling method, KMVM (Linux Kernel Modeling and verification Method), based on type theory for proper designation and correct exploitation of the Kernel. In the model, the Kernel is separated into six levels: subsystem, dentry, file, struct, func, and base. Each level is treated as a type. The types are specified in the structure and relationship. At the same time, we use a demanding path to express the function to be implemented. The correctness of the design is verified by recursively checking the type relationship and type existence. The method has been applied to verify the OPEN business of VFS (virtual file system) in Linux Kernel. Also, we have designed and developed a set of security communication mechanisms in the Kernel with verification. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=formal%20approach" title="formal approach">formal approach</a>, <a href="https://publications.waset.org/abstracts/search?q=type%20theory" title=" type theory"> type theory</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux%20Kernel" title=" Linux Kernel"> Linux Kernel</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20program" title=" software program"> software program</a> </p> <a href="https://publications.waset.org/abstracts/155062/a-formal-verification-approach-for-linux-kernel-designing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155062.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17916</span> Performance Analysis of LINUX Operating System Connected in LAN Using Gumbel-Hougaard Family Copula Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20V.%20Singh">V. V. Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper we have focused on the study of a Linux operating system connected in a LAN (local area network). We have considered two different topologies STAR topology (subsystem-1) and BUS topology (subsystem-2) which are placed at two different places and connected to a server through a hub. In both topologies BUS topology and STAR topology, we have assumed 'n' clients. The system has two types of failure partial failure and complete failure. Further the partial failure has been categorized as minor partial failure and major partial failure. It is assumed that minor partial failure degrades the subsystem and the major partial failure brings the subsystem to break down mode. The system can completely failed due to failure of server hacking and blocking etc. The system is studied by supplementary variable technique and Laplace transform by taking different types of failure and two types of repairs. The various measures of reliability like availability of system, MTTF, profit function for different parametric values has been discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title="star topology">star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20topology" title=" bus topology"> bus topology</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=blocking" title=" blocking"> blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=linux%20operating%20system" title=" linux operating system"> linux operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=supplementary%20variable" title=" supplementary variable "> supplementary variable </a> </p> <a href="https://publications.waset.org/abstracts/33606/performance-analysis-of-linux-operating-system-connected-in-lan-using-gumbel-hougaard-family-copula-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33606.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">577</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17915</span> UNIX Source Code Leak: Evaluation and Feasible Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gu%20Dongxing">Gu Dongxing</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Yuxuan"> Li Yuxuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Nong%20Tengxiao"> Nong Tengxiao</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20transmission" title="data transmission">data transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux" title=" Linux"> Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20code" title=" source code"> source code</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a> </p> <a href="https://publications.waset.org/abstracts/153161/unix-source-code-leak-evaluation-and-feasible-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">270</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17914</span> Hardware Error Analysis and Severity Characterization in Linux-Based Server Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nikolaos%20Georgoulopoulos">Nikolaos Georgoulopoulos</a>, <a href="https://publications.waset.org/abstracts/search?q=Alkis%20Hatzopoulos"> Alkis Hatzopoulos</a>, <a href="https://publications.waset.org/abstracts/search?q=Konstantinos%20Karamitsios"> Konstantinos Karamitsios</a>, <a href="https://publications.waset.org/abstracts/search?q=Konstantinos%20Kotrotsios"> Konstantinos Kotrotsios</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexandros%20I.%20Metsai"> Alexandros I. Metsai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In modern server systems, business critical applications run in different types of infrastructure, such as cloud systems, physical machines and virtualization. Often, due to high load and over time, various hardware faults occur in servers that translate to errors, resulting to malfunction or even server breakdown. CPU, RAM and hard drive (HDD) are the hardware parts that concern server administrators the most regarding errors. In this work, selected RAM, HDD and CPU errors, that have been observed or can be simulated in kernel ring buffer log files from two groups of Linux servers, are investigated. Moreover, a severity characterization is given for each error type. Better understanding of such errors can lead to more efficient analysis of kernel logs that are usually exploited for fault diagnosis and prediction. In addition, this work summarizes ways of simulating hardware errors in RAM and HDD, in order to test the error detection and correction mechanisms of a Linux server. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hardware%20errors" title="hardware errors">hardware errors</a>, <a href="https://publications.waset.org/abstracts/search?q=Kernel%20logs" title=" Kernel logs"> Kernel logs</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux%20servers" title=" Linux servers"> Linux servers</a>, <a href="https://publications.waset.org/abstracts/search?q=RAM" title=" RAM"> RAM</a>, <a href="https://publications.waset.org/abstracts/search?q=hard%20disk" title=" hard disk"> hard disk</a>, <a href="https://publications.waset.org/abstracts/search?q=CPU" title=" CPU"> CPU</a> </p> <a href="https://publications.waset.org/abstracts/140496/hardware-error-analysis-and-severity-characterization-in-linux-based-server-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140496.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17913</span> Exploiting SLMail Server with a Developed Buffer Overflow with Kali Linux</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Senesh%20Wijayarathne">Senesh Wijayarathne</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study focuses on how someone could develop a Buffer Overflow and could use that to exploit the SLMail Server. This study uses a Kali Linux V2018.4 Virtual Machine and Windows 7 - Internet Explorer V8 Virtual Machine (IPv4 Address - 192.168.56.107). This study starts by sending continued bytes to the SLMail Server to find the crashing point range and creating a unique pattern of the length of the crashing point range to control the Extended Instruction Pointer (EIP). Then by sending all characters to SLMail Server, we could observe and find which characters are not rendered properly by the software, also known as Bad Characters. By finding the ‘Jump to the ESP register (JMP ESP) and with the help of ‘Mona Modules’, we could use msfvenom to create a non-stage windows reverse shell payload. By including all the details gathered previously on one script, we could get a system-level reverse shell of the Windows 7 PC. The end of this paper will discuss how to mitigate this vulnerability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=slmail%20server" title="slmail server">slmail server</a>, <a href="https://publications.waset.org/abstracts/search?q=extended%20instruction%20pointer" title=" extended instruction pointer"> extended instruction pointer</a>, <a href="https://publications.waset.org/abstracts/search?q=jump%20to%20the%20esp%20register" title=" jump to the esp register"> jump to the esp register</a>, <a href="https://publications.waset.org/abstracts/search?q=bad%20characters" title=" bad characters"> bad characters</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20machine" title=" virtual machine"> virtual machine</a>, <a href="https://publications.waset.org/abstracts/search?q=windows%207" title=" windows 7"> windows 7</a>, <a href="https://publications.waset.org/abstracts/search?q=kali%20Linux" title=" kali Linux"> kali Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=buffer%20overflow" title=" buffer overflow"> buffer overflow</a>, <a href="https://publications.waset.org/abstracts/search?q=Seattle%20lab" title=" Seattle lab"> Seattle lab</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a> </p> <a href="https://publications.waset.org/abstracts/150375/exploiting-slmail-server-with-a-developed-buffer-overflow-with-kali-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150375.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">165</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17912</span> Independent Encryption Technique for Mobile Voice Calls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nael%20Hirzalla">Nael Hirzalla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The legality of some countries or agencies’ acts to spy on personal phone calls of the public became a hot topic to many social groups’ talks. It is believed that this act is considered an invasion to someone’s privacy. Such act may be justified if it is singling out specific cases but to spy without limits is very unacceptable. This paper discusses the needs for not only a simple and light weight technique to secure mobile voice calls but also a technique that is independent from any encryption standard or library. It then presents and tests one encrypting algorithm that is based of frequency scrambling technique to show fair and delay-free process that can be used to protect phone calls from such spying acts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=frequency%20scrambling" title="frequency scrambling">frequency scrambling</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title=" mobile applications"> mobile applications</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time%20voice%20encryption" title=" real-time voice encryption"> real-time voice encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls" title=" spying on calls"> spying on calls</a> </p> <a href="https://publications.waset.org/abstracts/34059/independent-encryption-technique-for-mobile-voice-calls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34059.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">479</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17911</span> Malware Detection in Mobile Devices by Analyzing Sequences of System Calls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jorge%20Maestre%20Vidal">Jorge Maestre Vidal</a>, <a href="https://publications.waset.org/abstracts/search?q=Ana%20Lucila%20Sandoval%20Orozco"> Ana Lucila Sandoval Orozco</a>, <a href="https://publications.waset.org/abstracts/search?q=Luis%20Javier%20Garc%C3%ADa%20Villalba"> Luis Javier García Villalba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android" title="android">android</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20systems" title=" intrusion detection systems"> intrusion detection systems</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a> </p> <a href="https://publications.waset.org/abstracts/70344/malware-detection-in-mobile-devices-by-analyzing-sequences-of-system-calls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70344.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">303</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17910</span> Engineering the Human Mind: Social Engineering Attack Using Kali Linux</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joy%20Winston%20James">Joy Winston James</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdul%20Kadher%20Jilani"> Abdul Kadher Jilani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pen%20testing" title="pen testing">pen testing</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Kali%20Linux" title=" Kali Linux"> Kali Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20engineering" title=" social engineering"> social engineering</a> </p> <a href="https://publications.waset.org/abstracts/166413/engineering-the-human-mind-social-engineering-attack-using-kali-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166413.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17909</span> Outcome of Emergency Response Team System in In-Hospital Cardiac Arrest</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jirapat%20Suriyachaisawat">Jirapat Suriyachaisawat</a>, <a href="https://publications.waset.org/abstracts/search?q=Ekkit%20Surakarn"> Ekkit Surakarn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: To improve early detection and mortality rate of In- Hospital Cardiac arrest, Emergency Response Team (ERT) system was planned and implemented since June 2009 to detect pre-arrest conditions and for any concerns. The ERT consisted of on duty physicians and nurses from emergency department. ERT calling criteria consisted of acute change of HR < 40 or > 130 beats per minute, systolic blood pressure < 90mmHg, respiratory rate <8 or > 28 breaths per minute, O2 saturation < 90%, acute change in conscious state, acute chest pain or worried about the patients. From the data on ERT system implementation in our hospital in early phase (during June 2009-2011), there was no statistic significance in difference in In-Hospital cardiac arrest incidence and overall hospital mortality rate. Since the introduction of the ERT service in our hospital, we have conducted continuous educational campaign to improve awareness in an attempt to increase use of the service. Methods: To investigate outcome of ERT system in In-Hospital cardiac arrest and overall hospital mortality rate. We conducted a prospective, controlled before-and after examination of the long term effect of a ERT system on the incidence of cardiac arrest. We performed Chi -square analysis to find statistic significance. Results: Of a total 623 ERT cases from June 2009 until December 2012, there were 72 calls in 2009, 196 calls in 2010 ,139 calls in 2011 and 245 calls in 2012.The number of ERT calls per 1000 admissions in year 2009-10 was 7.69, 5.61 in 2011 and 9.38 in 2013. The number of Code blue calls per 1000 admissions decreased significantly from 2.28 to 0.99 per 1000 admissions (P value < 0.001). The incidence of cardiac arrest decreased progressively from 1.19 to 0.34 per 1000 admissions and significant in difference in year 2012 (P value < 0.001). The overall hospital mortality rate decreased by 8 % from 15.43 to 14.43 per 1000 admissions (P value 0.095). Conclusions: ERT system implementation was associated with progressive reduction in cardiac arrests over three year period, especially statistic significant in difference in 4th year after implementation. We also found an inverse association between number of ERT use and the risk of occurrence of cardiac arrests, But we have not found difference in overall hospital mortality rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emergency%20response%20team" title="emergency response team">emergency response team</a>, <a href="https://publications.waset.org/abstracts/search?q=ERT" title=" ERT"> ERT</a>, <a href="https://publications.waset.org/abstracts/search?q=cardiac%20arrest" title=" cardiac arrest"> cardiac arrest</a>, <a href="https://publications.waset.org/abstracts/search?q=emergency%20medicine" title=" emergency medicine "> emergency medicine </a> </p> <a href="https://publications.waset.org/abstracts/13824/outcome-of-emergency-response-team-system-in-in-hospital-cardiac-arrest" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13824.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">310</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17908</span> Long-Term Outcome of Emergency Response Team System in In-Hospital Cardiac Arrest</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jirapat%20Suriyachaisawat">Jirapat Suriyachaisawat</a>, <a href="https://publications.waset.org/abstracts/search?q=Ekkit%20Surakarn"> Ekkit Surakarn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: To improve early detection and mortality rate of in-hospital cardiac arrest, Emergency Response Team (ERT) system was planned and implemented since June 2009 to detect pre-arrest conditons and for any concerns. The ERT consisted of on duty physicians and nurses from emergency department. ERT calling criteria consisted of acute change of HR < 40 or > 130 beats per minute, systolic blood pressure < 90 mmHg, respiratory rate <8 or >28 breaths per minute, O2 saturation <90%, acute change in conscious state, acute chest pain or worry about the patients. From the data on ERT system implementation in our hospital in early phase (during June 2009-2011), there was no statistic significance in difference in in-hospital cardiac arrest incidence and overall hospital mortality rate. Since the introduction of the ERT service in our hospital, we have conducted continuous educational campaign to improve awareness in an attempt to increase use of the service. Methods: To investigate outcome of ERT system in in-hospital cardiac arrest and overall hospital mortality rate, we conducted a prospective, controlled before-and after examination of the long term effect of a ERT system on the incidence of cardiac arrest. We performed chi-square analysis to find statistic significance. Results: Of a total 623 ERT cases from June 2009 until December 2012, there were 72 calls in 2009, 196 calls in 2010, 139 calls in 2011 and 245 calls in 2012. The number of ERT calls per 1000 admissions in year 2009-10 was 7.69; 5.61 in 2011 and 9.38 in 2013. The number of code blue calls per 1000 admissions decreased significantly from 2.28 to 0.99 per 1000 admissions (P value < 0.001). The incidence of cardiac arrest decreased progressively from 1.19 to 0.34 per 1000 admissions and significant in difference in year 2012 (P value < 0.001 ). The overall hospital mortality rate decreased by 8 % from 15.43 to 14.43 per 1000 admissions (P value 0.095). Conclusions: ERT system implementation was associated with progressive reduction in cardiac arrests over three year period, especially statistic significant in difference in 4th year after implementation. We also found an inverse association between number of ERT use and the risk of occurrence of cardiac arrests, but we have not found difference in overall hospital mortality rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cardiac%20arrest" title="cardiac arrest">cardiac arrest</a>, <a href="https://publications.waset.org/abstracts/search?q=outcome" title=" outcome"> outcome</a>, <a href="https://publications.waset.org/abstracts/search?q=in-hospital" title=" in-hospital"> in-hospital</a>, <a href="https://publications.waset.org/abstracts/search?q=ERT" title=" ERT"> ERT</a> </p> <a href="https://publications.waset.org/abstracts/16350/long-term-outcome-of-emergency-response-team-system-in-in-hospital-cardiac-arrest" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16350.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">198</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17907</span> An AI Based Smart Conference Calling System Using Bluetooth Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ankita%20Dixit">Ankita Dixit</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A conference call using a mobile refers to a telephonic call in which several people talks to each other simultaneously. This is one of the most eminent features nowadays. This concept is already existing using LTE technology for mobile phones supporting SIM cards. Hence, currently, a conference call is possible only with the support of a SIM card, i.e., a Mobile operator. Bluetooth is a short-range wireless technology that is used for exchanging data between devices placed over short distances (up to 240 meters). This is a booming technology that is easily and freely available and has no dependency on network operators. Our study work proposes a smart system to enable conference calls with more than two mobile users without SIM support to communicate with each other simultaneously. The AI-based proposed solution will be self–governed, self-learned and will be intelligent enough to smartly switch between all callers connected via Bluetooth in a conference call. This proposed solution system will greatly increase the potential of using Bluetooth technology from a wider applicability perspective of conference calls, which is currently only possible over LTE mobiles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conference%20call" title="conference call">conference call</a>, <a href="https://publications.waset.org/abstracts/search?q=bluetooth" title=" bluetooth"> bluetooth</a>, <a href="https://publications.waset.org/abstracts/search?q=AI" title=" AI"> AI</a>, <a href="https://publications.waset.org/abstracts/search?q=frequency%20hopping" title=" frequency hopping"> frequency hopping</a>, <a href="https://publications.waset.org/abstracts/search?q=piconet" title=" piconet"> piconet</a>, <a href="https://publications.waset.org/abstracts/search?q=scatter%20net" title=" scatter net"> scatter net</a> </p> <a href="https://publications.waset.org/abstracts/168925/an-ai-based-smart-conference-calling-system-using-bluetooth-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168925.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">85</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17906</span> Teleconsultations and The Need of Onsite Additional Medical Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cristina%20Hotoleanu">Cristina Hotoleanu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: The recent Covid-19 pandemic accelerated the development of e-health, including telemedicine, smartphone applications, and medical wearable devices. Providing remote teleconsultations supposes challenges which may require further face-to-face medical interactions. The aim of this study was to assess the correlation between the types of teleconsultations and the need of onsite medical services (investigations and medical visits) for the diagnosis and treatment. Methods: a retrospective study including all the teleconsultations using the platform offered by a telehealth provider in Romania (Telios Care SA) between May 1, 2021- April 30, 2022, was performed. Binary data were analysed using the chi-square test with a significance level of p < 0.05. Results: out of 7163 consultations, 3961 were phone calls, 1981 were online messages, and 1221 were video calls. Onsite medical services were indicated in 3327 (46.44%) cases; the onsite investigations or the onsite visits were recommended for 2908 patients as follows: 2326 in case of phone calls, 582 in case of online messages, none in case of video calls. Both onsite investigations and visits were indicated for 419 patients. The need for onsite additional medical services was significantly higher in the case of phone calls than in the other 2 types of teleconsultations (Chi square= 1207.06, p= 0.00001). The indication for onsite services was done mainly after teleconsultations covering medical specialties (87.34%), significantly higher than the other specialties (Chi square=914.59, p=0.00001). Teleconsultations in surgical specialties and other fields (pharmacy, dentistry, psychology, wellbeing- nutrition, fitness) resulted in 12.13%, respective less than 1%, indication for onsite investigations or visits, explained by using of video calls in most of the cases. Conclusion: a further onsite medical service was necessary in less than a half of the teleconsultations. This indication was done mainly after phone calls and teleconsultations in medical specialties. Video calls were used mostly in psychology, nutrition, and fitness teleconsultations and did not require a further onsite medical service. Other studies are necessary to assess better the types of teleconsultations and the specialties bringing the biggest benefit for the patients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=onsite%20medical%20services" title="onsite medical services">onsite medical services</a>, <a href="https://publications.waset.org/abstracts/search?q=phone%20calls" title=" phone calls"> phone calls</a>, <a href="https://publications.waset.org/abstracts/search?q=teleconsultations" title=" teleconsultations"> teleconsultations</a>, <a href="https://publications.waset.org/abstracts/search?q=telemedicine" title=" telemedicine"> telemedicine</a> </p> <a href="https://publications.waset.org/abstracts/151975/teleconsultations-and-the-need-of-onsite-additional-medical-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151975.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">101</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17905</span> Design of Incident Information System in IoT Virtualization Platform</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amon%20Olimov">Amon Olimov</a>, <a href="https://publications.waset.org/abstracts/search?q=Umarov%20Jamshid"> Umarov Jamshid</a>, <a href="https://publications.waset.org/abstracts/search?q=Dae-Ho%20Kim"> Dae-Ho Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Chol-U%20Lee"> Chol-U Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Ryum-Duck%20Oh"> Ryum-Duck Oh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes IoT virtualization platform based incident information system. IoT information based environment is the platform that was developed for the purpose of collecting a variety of data by managing regionally scattered IoT devices easily and conveniently in addition to analyzing data collected from roads. Moreover, this paper configured the platform for the purpose of providing incident information based on sensed data. It also provides the same input/output interface as UNIX and Linux by means of matching IoT devices with the directory of file system and also the files. In addition, it has a variety of approaches as to the devices. Thus, it can be applied to not only incident information but also other platforms. This paper proposes the incident information system that identifies and provides various data in real time as to urgent matters on roads based on the existing USN/M2M and IoT visualization platform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=incident%20information%20system" title="incident information system">incident information system</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=virtualization%20platform" title=" virtualization platform"> virtualization platform</a>, <a href="https://publications.waset.org/abstracts/search?q=USN" title=" USN"> USN</a>, <a href="https://publications.waset.org/abstracts/search?q=M2M" title=" M2M"> M2M</a> </p> <a href="https://publications.waset.org/abstracts/29328/design-of-incident-information-system-in-iot-virtualization-platform" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29328.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">351</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17904</span> Scientific Linux Cluster for BIG-DATA Analysis (SLBD): A Case of Fayoum University</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hassan%20S.%20Hussein">Hassan S. Hussein</a>, <a href="https://publications.waset.org/abstracts/search?q=Rania%20A.%20Abul%20Seoud"> Rania A. Abul Seoud</a>, <a href="https://publications.waset.org/abstracts/search?q=Amr%20M.%20Refaat"> Amr M. Refaat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Scientific researchers face in the analysis of very large data sets that is increasing noticeable rate in today’s and tomorrow’s technologies. Hadoop and Spark are types of software that developed frameworks. Hadoop framework is suitable for many Different hardware platforms. In this research, a scientific Linux cluster for Big Data analysis (SLBD) is presented. SLBD runs open source software with large computational capacity and high performance cluster infrastructure. SLBD composed of one cluster contains identical, commodity-grade computers interconnected via a small LAN. SLBD consists of a fast switch and Gigabit-Ethernet card which connect four (nodes). Cloudera Manager is used to configure and manage an Apache Hadoop stack. Hadoop is a framework allows storing and processing big data across the cluster by using MapReduce algorithm. MapReduce algorithm divides the task into smaller tasks which to be assigned to the network nodes. Algorithm then collects the results and form the final result dataset. SLBD clustering system allows fast and efficient processing of large amount of data resulting from different applications. SLBD also provides high performance, high throughput, high availability, expandability and cluster scalability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data%20platforms" title="big data platforms">big data platforms</a>, <a href="https://publications.waset.org/abstracts/search?q=cloudera%20manager" title=" cloudera manager"> cloudera manager</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadoop" title=" Hadoop"> Hadoop</a>, <a href="https://publications.waset.org/abstracts/search?q=MapReduce" title=" MapReduce"> MapReduce</a> </p> <a href="https://publications.waset.org/abstracts/40811/scientific-linux-cluster-for-big-data-analysis-slbd-a-case-of-fayoum-university" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40811.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17903</span> Financial Reports and Common Ownership: An Analysis of the Mechanisms Common Owners Use to Induce Anti-Competitive Behavior</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kevin%20Smith">Kevin Smith</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Publicly traded company in the US are legally obligated to host earnings calls that discuss their most recent financial reports. During these calls, investors are able to ask these companies questions about these financial reports and on the future direction of the company. This paper examines whether common institutional owners use these calls as a way to indirectly signal to companies in their portfolio to not take actions that could hurt the common owner's interests. This paper uses transcripts taken from the earnings calls of the six largest health insurance companies in the US from 2014 to 2019. This data is analyzed using text analysis and sentiment analysis to look for patterns in the statements made by common owners. The analysis found that common owners where more likely to recommend against direct price competition and instead redirect the insurance companies towards more passive actions, like investing in new technologies. This result indicates a mechanism that common owners use to reduce competition in the health insurance market. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=common%20ownership" title="common ownership">common ownership</a>, <a href="https://publications.waset.org/abstracts/search?q=text%20analysis" title=" text analysis"> text analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=sentiment%20analysis" title=" sentiment analysis"> sentiment analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/172014/financial-reports-and-common-ownership-an-analysis-of-the-mechanisms-common-owners-use-to-induce-anti-competitive-behavior" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172014.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">74</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17902</span> Improving Communication System through Router Configuration: The Nigerian Navy Experience</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saidu%20I.%20Rambo">Saidu I. Rambo</a>, <a href="https://publications.waset.org/abstracts/search?q=Emmanuel%20O.%20Ibam"> Emmanuel O. Ibam</a>, <a href="https://publications.waset.org/abstracts/search?q=Sunday%20O.%20Adewale"> Sunday O. Adewale</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The configuration of routers for effective communication in the Nigerian Navy (NN) enables the navy to improve on the current communication systems. The current system is faced with challenges that make the systems partially effective. The major implementation of the system is to configure routers using hierarchical model and obtaining a VSAT option on C-band platform. These routers will act as a link between Naval Headquarters and the Commands under it. The routers main responsibilities are to forward packets from source location to destination using a Link State Routing Protocol (LSRP). Also using the Point to Point Protocol (PPP), creates a strong encrypted password using Challenge Handshake Authentication Protocol (CHAP) which uses one-way hash function of Message Digest 5 (MD5) to provide complete protection against hackers/intruders. Routers can be configured using a Linux operating system or internet work operating system in the Microsoft platform. With this, system packets can be forwarded to various locations more effectively than the present system being used. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=C-band" title="C-band">C-band</a>, <a href="https://publications.waset.org/abstracts/search?q=communication" title=" communication"> communication</a>, <a href="https://publications.waset.org/abstracts/search?q=router" title=" router"> router</a>, <a href="https://publications.waset.org/abstracts/search?q=VSAT" title=" VSAT"> VSAT</a> </p> <a href="https://publications.waset.org/abstracts/9952/improving-communication-system-through-router-configuration-the-nigerian-navy-experience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9952.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">366</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17901</span> Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gurkirat%20Kaur">Gurkirat Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Manoj%20Kumar"> Manoj Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Manju%20Bala"> Manju Bala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ethernet is the most influential and widely used technology in the world. With the growing demand of low latency and high throughput technologies like InfiniBand and RoCE, unique features viz. RDMA (Remote Direct Memory Access) have evolved. RDMA is an effective technology which is used for reducing system load and improving performance. InfiniBand is a well known technology which provides high-bandwidth and low-latency and makes optimal use of in-built features like RDMA. With the rapid evolution of InfiniBand technology and Ethernet lacking the RDMA and zero copy protocol, the Ethernet community has came out with a new enhancements that bridges the gap between InfiniBand and Ethernet. By adding the RDMA and zero copy protocol to the Ethernet a new networking technology is evolved, called RDMA over Converged Ethernet (RoCE). RoCE is a standard released by the IBTA standardization body to define RDMA protocol over Ethernet. With the emergence of lossless Ethernet, RoCE uses InfiniBand’s efficient transport to provide the platform for deploying RDMA technology in mainstream data centres over 10GigE, 40GigE and beyond. RoCE provide all of the InfiniBand benefits transport benefits and well established RDMA ecosystem combined with converged Ethernet. In this paper, we evaluate the heterogeneous Linux cluster, having multi nodes with fast interconnects i.e. gigabit Ethernet and Soft RoCE. This paper presents the heterogeneous Linux cluster configuration and evaluates its performance using Intel’s MPI Benchmarks. Our result shows that Soft RoCE is performing better than Ethernet in various performance metrics like bandwidth, latency and throughput. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethernet" title="ethernet">ethernet</a>, <a href="https://publications.waset.org/abstracts/search?q=InfiniBand" title=" InfiniBand"> InfiniBand</a>, <a href="https://publications.waset.org/abstracts/search?q=RoCE" title=" RoCE"> RoCE</a>, <a href="https://publications.waset.org/abstracts/search?q=RDMA" title=" RDMA"> RDMA</a>, <a href="https://publications.waset.org/abstracts/search?q=MPI" title=" MPI"> MPI</a>, <a href="https://publications.waset.org/abstracts/search?q=Soft%20RoCE" title=" Soft RoCE"> Soft RoCE</a> </p> <a href="https://publications.waset.org/abstracts/8912/performance-evaluation-of-soft-roce-over-1-gigabit-ethernet" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8912.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">464</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17900</span> A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoqing%20Wang">Xiaoqing Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Junfeng%20Wang"> Junfeng Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaolan%20Zhu"> Xiaolan Zhu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android" title="android">android</a>, <a href="https://publications.waset.org/abstracts/search?q=API%20Calls" title=" API Calls"> API Calls</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=permissions%20combination" title=" permissions combination"> permissions combination</a> </p> <a href="https://publications.waset.org/abstracts/51217/a-static-android-malware-detection-based-on-actual-used-permissions-combination-and-api-calls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51217.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">329</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17899</span> Embedded Acoustic Signal Processing System Using OpenMP Architecture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelkader%20Elhanaoui">Abdelkader Elhanaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Mhamed%20Hadji"> Mhamed Hadji</a>, <a href="https://publications.waset.org/abstracts/search?q=Rachid%20Skouri"> Rachid Skouri</a>, <a href="https://publications.waset.org/abstracts/search?q=Said%20Agounad"> Said Agounad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, altera de1-SoC FPGA board technology is utilized as a distinguished tool for nondestructive characterization of an aluminum circular cylindrical shell of radius ratio b/a (a: outer radius; b: inner radius). The acoustic backscattered signal processing system has been developed using OpenMP architecture. The design is built in three blocks; it is implemented per functional block, in a heterogeneous Intel-Altera system running under Linux. The useful data to determine the performances of SoC FPGA is computed by the analytical method. The exploitation of SoC FPGA has lead to obtain the backscattering form function and resonance spectra. A0 and S0 modes of propagation in the tube are shown. The findings are then compared to those achieved from the Matlab simulation of analytical method. A good agreement has, therefore, been noted. Moreover, the detailed SoC FPGA-based system has shown that acoustic spectra are performed at up to 5 times faster than the Matlab implementation using almost the same data. This FPGA-based system implementation of processing algorithms is realized with a coefficient of correlation R and absolute error respectively about 0.962 and 5 10⁻⁵. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=OpenMP" title="OpenMP">OpenMP</a>, <a href="https://publications.waset.org/abstracts/search?q=signal%20processing%20system" title=" signal processing system"> signal processing system</a>, <a href="https://publications.waset.org/abstracts/search?q=acoustic%20backscattering" title=" acoustic backscattering"> acoustic backscattering</a>, <a href="https://publications.waset.org/abstracts/search?q=nondestructive%20characterization" title=" nondestructive characterization"> nondestructive characterization</a>, <a href="https://publications.waset.org/abstracts/search?q=thin%20tubes" title=" thin tubes"> thin tubes</a> </p> <a href="https://publications.waset.org/abstracts/162330/embedded-acoustic-signal-processing-system-using-openmp-architecture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162330.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">92</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17898</span> The Transformation of the Workplace through Robotics, Artificial Intelligence, and Automation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Javed%20Mohammed">Javed Mohammed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Robotics is the fastest growing industry in the world, poised to become the largest in the next decade. The use of robots requires design, application and implementation of the appropriate safety controls in order to avoid creating hazards to production personnel, programmers, maintenance specialists and systems engineers. The increasing use of artificial intelligence (AI) and related technologies in the workplace are dramatically changing the employment landscape. The impact of robotics technology on workplace policy is dramatic and complex. The robotics revolution calls for a comprehensive approach to job training, and retraining, to mitigate worker displacement and enable workers to benefit from the new jobs that the technology will generate. It calls for a thoughtful, forward-thinking approach by lawmakers, regulators and employers to prepare for the oncoming transformation of the workplace and workforce. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design" title="design">design</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=programmers" title=" programmers"> programmers</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20engineers" title=" system engineers"> system engineers</a>, <a href="https://publications.waset.org/abstracts/search?q=robotics" title=" robotics"> robotics</a>, <a href="https://publications.waset.org/abstracts/search?q=transformation" title=" transformation"> transformation</a> </p> <a href="https://publications.waset.org/abstracts/23294/the-transformation-of-the-workplace-through-robotics-artificial-intelligence-and-automation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23294.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">473</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17897</span> A Holistic Analysis of the Emergency Call: From in Situ Negotiation to Policy Frameworks and Back</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jo%20Angouri">Jo Angouri</a>, <a href="https://publications.waset.org/abstracts/search?q=Charlotte%20Kennedy"> Charlotte Kennedy</a>, <a href="https://publications.waset.org/abstracts/search?q=Shawnea%20Ting"> Shawnea Ting</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Rawlinson"> David Rawlinson</a>, <a href="https://publications.waset.org/abstracts/search?q=Matthew%20Booker"> Matthew Booker</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigel%20Rees"> Nigel Rees</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ambulance services need to balance the large volume of emergency (999 in the UK) calls they receive (e.g., West Midlands Ambulance Service reports per day about 4,000 999 calls; about 679,000 calls per year are received in Wales), with dispatching limited resource for on-site intervention to the most critical cases. The process by which Emergency Medical Dispatch (EMD) decisions are made is related to risk assessment and involves the caller and call-taker as well as clinical teams negotiating risk levels on a case-by-case basis. Medical Priority Dispatch System (MPDS – also referred to as Advanced Medical Priority Dispatch System AMPDS) are used in the UK by NHS Trusts (e.,g WAST) to process and prioritise 999 calls. MPDS / AMPDS provide structured protocols for call prioritisation and call management. Protocols/policy frameworks have not been examined before in the way we propose in our project. In more detail, the risk factors that play a role in the EMD negotiation between the caller and call-taker have been analysed in both medical and social science research. Research has focused on the structural, morphological and phonological aspects that could improve, and train, human-to-human interaction or automate risk detection, as well as the medical factors that need to be captured from the caller to inform the dispatch decision. There are two significant gaps in our knowledge that we address in our work: 1. the role of backstage clinical teams in translating the caller/call-taker interaction in their internal risk negotiation and, 2. the role of policy frameworks, protocols and regulations in the framing of institutional priorities and resource allocation. We take a multi method approach and combine the analysis of 999 calls with the analysis of policy documents. We draw on interaction analysis, corpus methodologies and thematic analysis. In this paper, we report on our preliminary findings and focus in particular on the risk factors we have identified and the relationship with the regulations that create the frame within which teams operate. We close the paper with implications of our study for providing evidence-based policy intervention and recommendations for further research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emergency%20%28999%29%20call" title="emergency (999) call">emergency (999) call</a>, <a href="https://publications.waset.org/abstracts/search?q=interaction%20analysis" title=" interaction analysis"> interaction analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=discourse%20analysis" title=" discourse analysis"> discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=ambulance%20dispatch" title=" ambulance dispatch"> ambulance dispatch</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20discourse" title=" medical discourse"> medical discourse</a> </p> <a href="https://publications.waset.org/abstracts/168977/a-holistic-analysis-of-the-emergency-call-from-in-situ-negotiation-to-policy-frameworks-and-back" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168977.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17896</span> Design of a Real Time Closed Loop Simulation Test Bed on a General Purpose Operating System: Practical Approaches</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pratibha%20Srivastava">Pratibha Srivastava</a>, <a href="https://publications.waset.org/abstracts/search?q=Chithra%20V.%20J."> Chithra V. J.</a>, <a href="https://publications.waset.org/abstracts/search?q=Sudhakar%20S."> Sudhakar S.</a>, <a href="https://publications.waset.org/abstracts/search?q=Nitin%20K.%20D."> Nitin K. D.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A closed-loop system comprises of a controller, a response system, and an actuating system. The controller, which is the system under test for us, excites the actuators based on feedback from the sensors in a periodic manner. The sensors should provide the feedback to the System Under Test (SUT) within a deterministic time post excitation of the actuators. Any delay or miss in the generation of response or acquisition of excitation pulses may lead to control loop controller computation errors, which can be catastrophic in certain cases. Such systems categorised as hard real-time systems that need special strategies. The real-time operating systems available in the market may be the best solutions for such kind of simulations, but they pose limitations like the availability of the X Windows system, graphical interfaces, other user tools. In this paper, we present strategies that can be used on a general purpose operating system (Bare Linux Kernel) to achieve a deterministic deadline and hence have the added advantages of a GPOS with real-time features. Techniques shall be discussed how to make the time-critical application run with the highest priority in an uninterrupted manner, reduced network latency for distributed architecture, real-time data acquisition, data storage, and retrieval, user interactions, etc. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=real%20time%20data%20acquisition" title="real time data acquisition">real time data acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20time%20kernel%20preemption" title=" real time kernel preemption"> real time kernel preemption</a>, <a href="https://publications.waset.org/abstracts/search?q=scheduling" title=" scheduling"> scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20latency" title=" network latency"> network latency</a> </p> <a href="https://publications.waset.org/abstracts/117763/design-of-a-real-time-closed-loop-simulation-test-bed-on-a-general-purpose-operating-system-practical-approaches" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117763.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">147</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17895</span> Clinical Advice Services: Using Lean Chassis to Optimize Nurse-Driven Telephonic Triage of After-Hour Calls from Patients</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eric%20Lee%20G.%20Escobedo-Wu">Eric Lee G. Escobedo-Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Nidhi%20Rohatgi"> Nidhi Rohatgi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fouzel%20Dhebar"> Fouzel Dhebar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is challenging for patients to navigate through healthcare systems after-hours. This leads to delays in care, patient/provider dissatisfaction, inappropriate resource utilization, readmissions, and higher costs. It is important to provide patients and providers with effective clinical decision-making tools to allow seamless connectivity and coordinated care. In August 2015, patient-centric Stanford Health Care established Clinical Advice Services (CAS) to provide clinical decision support after-hours. CAS is founded on key Lean principles: Value stream mapping, empathy mapping, waste walk, takt time calculations, standard work, plan-do-check-act cycles, and active daily management. At CAS, Clinical Assistants take the initial call and manage all non-clinical calls (e.g., appointments, directions, general information). If the patient has a clinical symptom, the CAS nurses take the call and utilize standardized clinical algorithms to triage the patient to home, clinic, urgent care, emergency department, or 911. Nurses may also contact the on-call physician based on the clinical algorithm for further direction and consultation. Since August 2015, CAS has managed 228,990 calls from 26 clinical specialties. Reporting is built into the electronic health record for analysis and data collection. 65.3% of the after-hours calls are clinically related. Average clinical algorithm adherence rate has been 92%. An average of 9% of calls was escalated by CAS nurses to the physician on call. An average of 5% of patients was triaged to the Emergency Department by CAS. Key learnings indicate that a seamless connectivity vision, cascading, multidisciplinary ownership of the problem, and synergistic enterprise improvements have contributed to this success while striving for continuous improvement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=after%20hours%20phone%20calls" title="after hours phone calls">after hours phone calls</a>, <a href="https://publications.waset.org/abstracts/search?q=clinical%20advice%20services" title=" clinical advice services"> clinical advice services</a>, <a href="https://publications.waset.org/abstracts/search?q=nurse%20triage" title=" nurse triage"> nurse triage</a>, <a href="https://publications.waset.org/abstracts/search?q=Stanford%20Health%20Care" title=" Stanford Health Care"> Stanford Health Care</a> </p> <a href="https://publications.waset.org/abstracts/90272/clinical-advice-services-using-lean-chassis-to-optimize-nurse-driven-telephonic-triage-of-after-hour-calls-from-patients" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90272.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">174</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=597">597</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=598">598</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>