scholarly journals Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android

Author(s):  
Muhammad Naveed ◽  
Xiaoyong Zhou ◽  
Soteris Demetriou ◽  
XiaoFeng Wang ◽  
Carl A Gunter
Keyword(s):  
2010 ◽  
Vol 22 (4) ◽  
pp. 205-207 ◽  
Author(s):  
Toshitaka Muto ◽  
Noritaka Yahara ◽  
Takafumi Hashiba

1993 ◽  
Vol 30 (1) ◽  
pp. 29-34 ◽  
Author(s):  
Margareta Larson ◽  
Kjell-Ove Sällström ◽  
Ola Larson ◽  
John Mcwilliam ◽  
Margareta Ideberg

Sixty-eight children born with complete unilateral cleft lip and palate were studied using dental casts taken at ages 0-0,1; 0,2-0,4; and 0,5-0,6 years of age. They were all treated with preoperative maxillofacial orthopedics using an external device (T-traction). The treatment was started after the first model was taken. Dental casts were analyzed regarding the morphology of the cleft region and the maxillary segments before and after treatment. The measurements were compared with measurements on dental casts of nontreated cleft children of similar age. The results suggest that a more normal anatomy of the cleft region occurs during the first 6 months of life whether preoperative maxillofacial orthopedics (T-traction) is used or not. However, this normalized growth seems to occur faster with the T-traction.


2021 ◽  
Vol 15 (2) ◽  
pp. 11-15
Author(s):  
Ramazan Əzizxan oğlu Eyyubov ◽  
◽  
Leyla Elxan qızı Bayramova ◽  
Zeynəb Mirsəməd qızı Sadıqova ◽  
◽  
...  

The program is stored in the machine's memory from any external device. The control device organizes its execution, taking into account the program in memory. The mathematical-logical device performs mathematical and logical calculations in accordance with the entered commands. Thus, the computer performs calculations without human assistance. Key words: computer, software, device, information, scheme


2019 ◽  
Vol 156 (6) ◽  
pp. S-356
Author(s):  
Dan M. Livovsky ◽  
Benjamin Koslowsky ◽  
Joseph Lysy

2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Qingyi Zhu ◽  
Seng W. Loke ◽  
Ye Zhang

The rapid propagation of computer virus is one of the greatest threats to current cybersecurity. This work deals with the optimal control problem of virus propagation among computers and external devices. To formulate this problem, two control strategies are introduced: (a) external device blocking, which means prohibiting a fraction of connections between external devices and computers, and (b) computer reconstruction, which includes updating or reinstalling of some infected computers. Then the combination of both the impact of infection and the cost of controls is minimized. In contrast with previous works, this paper takes into account a state-based cost weight index in the objection function instead of a fixed one. By using Pontryagin’s minimum principle and a modified forward-backward difference approximation algorithm, the optimal solution of the system is investigated and numerically solved. Then numerical results show the flexibility of proposed approach compared to the regular optimal control. More numerical results are also given to evaluate the performance of our approach with respect to various weight indexes.


Sign in / Sign up

Export Citation Format

Share Document