The world of information technology and communication is moving towards standardization of hardware
ports. All kind of communication is now using USB as the port as it is universally recognized hardware
medium of data communication. It is become flexible and easy to use kind of things with portable USB
storage devices to copy data from one system to another system. It is possible to copy data within seconds
with the help of portable USB flash memory devices. It has leaded insecurity of data storage on computer
system. Various surveys has shown after network copy only USB data copy has made data insecure on
computer . It is also the source of malwares in the system. To disable the USB ports is not the solution to
this problem because almost all peripheral devices now uses the USB ports for communication. So, we have
implemented a system which has complete USB storage enable and disable control for Linux operating
system. The administrator will decide the storage devices connected to USB must be enabled or disabled .
We experimented the algorithm on Linux kernel version 3.11 onwards on Debian based linux distributions.
We have got 100% success rate of the said system with zero percent performance degradation.
When I was president of the SUNY Cortland Physics Club, I tried introducing Linux distros and the UNIX OS to the club at large, including installing Linux on the club computers. Funny story, one time when messing around in Ubuntu I deleted the Bootloader by accident, and spent hours trying to get the computer to load back up. I was so proud when I figured it out that I didn't even fix the problem, I just left a sticky note telling other people how to boot the computer up if they wanted to use it
When I was president of the SUNY Cortland Physics Club, I tried introducing Linux distros and the UNIX OS to the club at large, including installing Linux on the club computers. Funny story, one time when messing around in Ubuntu I deleted the Bootloader by accident, and spent hours trying to get the computer to load back up. I was so proud when I figured it out that I didn't even fix the problem, I just left a sticky note telling other people how to boot the computer up if they wanted to use it
Adding ntfs support to android operating system via kernelijcseit
Android is a nascent mobile operating system based on the Linux kernel that is developed by Google but
lacks support for disks partitioned with the NTFS. Currently in the Google Play Store there are some third
party applications to provide NTFS support to Android OS. But the main disadvantage of such
applications is that the phone needs to be rooted (flashed) which may be tedious for a lay user and in
many cases may void the device’s warranty. And above all, a custom ROM needs to be installed to avail
the NTFS functionality.
This paper covers a technique to provide native support for NTFS (New Technology File System) in the
Android operating system by avoiding the rooting process. Hence to use NTFS-SD card or NTFS HDD
we won’t require any third party applications to perform basic read/write operations. This is implemented
with the help of the Virtual Filesystem layer (VFS) which is a subsystem of the kernel that implements
the file and the file system-related interfaces provided to user-space programs. The NTFS will rely on the
VFS layer to enable programs to use standard UNIX system calls to make basic operations like read/write
as well as advanced features which NTFS has.
Types of File Systems
How does the file system handle security?
Attacks on the file system
How does the file system ensure data integrity?
A file system is an abstraction to store, retrieve and update a set of files. The term also identifies the data structures specified by some of those abstractions, which are designed to organize multiple files as a single stream of bytes. responsible for organizing files and directories, and keeping track of which areas of the media belong to which file and which are not being used.
عمار عبد الكريم صاحب مبارك
AmmAr Abdualkareem sahib mobark
In order to solve the problem of providing a detailed plan of passenger car's loading scheme for the transportation company, and to provide general program for transportation planning, the blanking model of solving the loading problem is established .First by giving the load model of single-deck and single-row car, then established the blanking model for the decision variables by taking model number, so that can solve the problem of arbitrary loading values. The numerical calculation of blanking model has discussed specially, and by making corresponding program, the loading plan of passenger car that to solve the problem has been given.
Parallel wisard object tracker a rambased tracking systemcseij
This paper proposes the Parallel WiSARD Object Tracker (PWOT), a new object tracker based on the
WiSARD weightless neural network that is robust against quantization errors. Object tracking in video is
an important and challenging task in many applications. Difficulties can arise due to weather conditions,
target trajectory and appearance, occlusions, lighting conditions and noise. Tracking is a high-level
application and requires the object location frame by frame in real time. This paper proposes a fast hybrid
image segmentation (threshold and edge detection) in YcbCr color model and a parallel RAM based
discriminator that improves efficiency when quantization errors occur. The original WiSARD training
algorithm was changed to allow the tracking.
Model based test case prioritization using neural network classificationcseij
Model-based testing for real-life software systems often require a large number of tests, all of which cannot
exhaustively be run due to time and cost constraints. Thus, it is necessary to prioritize the test cases in
accordance with their importance the tester perceives. In this paper, this problem is solved by improving
our given previous study, namely, applying classification approach to the results of our previous study
functional relationship between the test case prioritization group membership and the two attributes:
important index and frequency for all events belonging to given group are established. A for classification
purpose, neural network (NN) that is the most advances is preferred and a data set obtained from our study
for all test cases is classified using multilayer perceptron (MLP) NN. The classification results for
commercial test prioritization application show the high classification accuracies about 96% and the
acceptable test prioritization performances are achieved.
Spatial database are becoming more and more popular in recent years. There is more and more
commercial and research interest in location-based search from spatial database. Spatial keyword search
has been well studied for years due to its importance to commercial search engines. Specially, a spatial
keyword query takes a user location and user-supplied keywords as arguments and returns objects that are
spatially and textually relevant to these arguments. Geo-textual index play an important role in spatial
keyword querying. A number of geo-textual indices have been proposed in recent years which mainly
combine the R-tree and its variants and the inverted file. This paper propose new index structure that
combine K-d tree and inverted file for spatial range keyword query which are based on the most spatial
and textual relevance to query point within given range.
USING TF-ISF WITH LOCAL CONTEXT TO GENERATE AN OWL DOCUMENT REPRESENTATION FO...cseij
In this paper we combine our previous research in the field of Semantic web, especially ontology learning and population with Sentence retrieval. To do this we developed a new approach to sentence retrieval
modifying our previous TF-ISF method which uses local context information to take into account only document level information. This is quite a new approach to sentence retrieval, presented for the first time
in this paper and also compared to the existing methods that use information from whole document collection. Using this approach and developed methods for sentence retrieval on a document level it is possible to assess the relevance of a sentence by using only the information from the retrieved sentence’s document and to define a document level OWL representation for sentence retrieval that can be
automatically populated. In this way the idea of Semantic Web through automatic and semi-automatic
extraction of additional information from existing web resources is supported. Additional information is
formatted in OWL document containing document sentence relevance for sentence retrieval.
Convincing a customer is always considered as a challenging task in every business. But when it comes to
online business, this task becomes even more difficult. Online retailers try everything possible to gain the
trust of the customer. One of the solutions is to provide an area for existing users to leave their comments.
This service can effectively develop the trust of the customer however normally the customer comments
about the product in their native language using Roman script. If there are hundreds of comments this
makes difficulty even for the native customers to make a buying decision. This research proposes a system
which extracts the comments posted in Roman Urdu, translate them, find their polarity and then gives us
the rating of the product. This rating will help the native and non-native customers to make buying decision
efficiently from the comments posted in Roman Urdu.
Adding ntfs support to android operating system via kernelijcseit
Android is a nascent mobile operating system based on the Linux kernel that is developed by Google but
lacks support for disks partitioned with the NTFS. Currently in the Google Play Store there are some third
party applications to provide NTFS support to Android OS. But the main disadvantage of such
applications is that the phone needs to be rooted (flashed) which may be tedious for a lay user and in
many cases may void the device’s warranty. And above all, a custom ROM needs to be installed to avail
the NTFS functionality.
This paper covers a technique to provide native support for NTFS (New Technology File System) in the
Android operating system by avoiding the rooting process. Hence to use NTFS-SD card or NTFS HDD
we won’t require any third party applications to perform basic read/write operations. This is implemented
with the help of the Virtual Filesystem layer (VFS) which is a subsystem of the kernel that implements
the file and the file system-related interfaces provided to user-space programs. The NTFS will rely on the
VFS layer to enable programs to use standard UNIX system calls to make basic operations like read/write
as well as advanced features which NTFS has.
Types of File Systems
How does the file system handle security?
Attacks on the file system
How does the file system ensure data integrity?
A file system is an abstraction to store, retrieve and update a set of files. The term also identifies the data structures specified by some of those abstractions, which are designed to organize multiple files as a single stream of bytes. responsible for organizing files and directories, and keeping track of which areas of the media belong to which file and which are not being used.
عمار عبد الكريم صاحب مبارك
AmmAr Abdualkareem sahib mobark
In order to solve the problem of providing a detailed plan of passenger car's loading scheme for the transportation company, and to provide general program for transportation planning, the blanking model of solving the loading problem is established .First by giving the load model of single-deck and single-row car, then established the blanking model for the decision variables by taking model number, so that can solve the problem of arbitrary loading values. The numerical calculation of blanking model has discussed specially, and by making corresponding program, the loading plan of passenger car that to solve the problem has been given.
Parallel wisard object tracker a rambased tracking systemcseij
This paper proposes the Parallel WiSARD Object Tracker (PWOT), a new object tracker based on the
WiSARD weightless neural network that is robust against quantization errors. Object tracking in video is
an important and challenging task in many applications. Difficulties can arise due to weather conditions,
target trajectory and appearance, occlusions, lighting conditions and noise. Tracking is a high-level
application and requires the object location frame by frame in real time. This paper proposes a fast hybrid
image segmentation (threshold and edge detection) in YcbCr color model and a parallel RAM based
discriminator that improves efficiency when quantization errors occur. The original WiSARD training
algorithm was changed to allow the tracking.
Model based test case prioritization using neural network classificationcseij
Model-based testing for real-life software systems often require a large number of tests, all of which cannot
exhaustively be run due to time and cost constraints. Thus, it is necessary to prioritize the test cases in
accordance with their importance the tester perceives. In this paper, this problem is solved by improving
our given previous study, namely, applying classification approach to the results of our previous study
functional relationship between the test case prioritization group membership and the two attributes:
important index and frequency for all events belonging to given group are established. A for classification
purpose, neural network (NN) that is the most advances is preferred and a data set obtained from our study
for all test cases is classified using multilayer perceptron (MLP) NN. The classification results for
commercial test prioritization application show the high classification accuracies about 96% and the
acceptable test prioritization performances are achieved.
Spatial database are becoming more and more popular in recent years. There is more and more
commercial and research interest in location-based search from spatial database. Spatial keyword search
has been well studied for years due to its importance to commercial search engines. Specially, a spatial
keyword query takes a user location and user-supplied keywords as arguments and returns objects that are
spatially and textually relevant to these arguments. Geo-textual index play an important role in spatial
keyword querying. A number of geo-textual indices have been proposed in recent years which mainly
combine the R-tree and its variants and the inverted file. This paper propose new index structure that
combine K-d tree and inverted file for spatial range keyword query which are based on the most spatial
and textual relevance to query point within given range.
USING TF-ISF WITH LOCAL CONTEXT TO GENERATE AN OWL DOCUMENT REPRESENTATION FO...cseij
In this paper we combine our previous research in the field of Semantic web, especially ontology learning and population with Sentence retrieval. To do this we developed a new approach to sentence retrieval
modifying our previous TF-ISF method which uses local context information to take into account only document level information. This is quite a new approach to sentence retrieval, presented for the first time
in this paper and also compared to the existing methods that use information from whole document collection. Using this approach and developed methods for sentence retrieval on a document level it is possible to assess the relevance of a sentence by using only the information from the retrieved sentence’s document and to define a document level OWL representation for sentence retrieval that can be
automatically populated. In this way the idea of Semantic Web through automatic and semi-automatic
extraction of additional information from existing web resources is supported. Additional information is
formatted in OWL document containing document sentence relevance for sentence retrieval.
Convincing a customer is always considered as a challenging task in every business. But when it comes to
online business, this task becomes even more difficult. Online retailers try everything possible to gain the
trust of the customer. One of the solutions is to provide an area for existing users to leave their comments.
This service can effectively develop the trust of the customer however normally the customer comments
about the product in their native language using Roman script. If there are hundreds of comments this
makes difficulty even for the native customers to make a buying decision. This research proposes a system
which extracts the comments posted in Roman Urdu, translate them, find their polarity and then gives us
the rating of the product. This rating will help the native and non-native customers to make buying decision
efficiently from the comments posted in Roman Urdu.
TRAFFIC-SIGN RECOGNITION FOR AN INTELLIGENT VEHICLE/DRIVER ASSISTANT SYSTEM U...cseij
In order to be deployed in driving environments, Intelligent transport system (ITS) must be able to
recognize and respond to exceptional road conditions such as traffic signs, highway work zones and
imminent road works automatically. Recognition of traffic sign is playing a vital role in the intelligent
transport system, it enhances traffic safety by providing drivers with safety and precaution information
about road hazards. To recognize the traffic sign, the system has been proposed with three phases. They
are Traffic board Detection, Feature extraction and Recognition. The detection phase consists of RGBbased
colour thresholding and shape analysis, which offers robustness to differences in lighting situations.
A Histogram of Oriented Gradients (HOG) technique was adopted to extract the features from the
segmented output. Finally, traffic signs recognition is done by k-Nearest Neighbors (k-NN) classifiers. It
achieves an classification accuracy upto 63%.
Modeling of driver lane choice behavior with artificial neural networks (ann)...cseij
In parallel to the economic developments, the importance of road transportation was significantly
increased in Turkey. As a result of this, long-distance freight transportation gains more importance and
hence numbers of the heavy vehicles were significantly increased. Consequently, road surface deformations
are observed on the roads as the increasing freight transportation and climatic conditions influence the
road surface. Therefore, loss of functionality of the road surface is observed and drivers are much prone to
accident due to their driving characteristics as they can have more tendencies to change their lanes not to
pass through the deformation area. In this study, the lane changing behaviors of the drivers were
investigated and both Artificial Neural Network (ANN) and Linear Regression (LR) models were proposed
to simulate the driver behavior of lane changing who approach to a specific road deformation area. The
potential of ANN model for simulating the driver behavior was evaluated with successive comparison of the
model performances with LR model. While there was a slight performance increase for the ANN model with
respect to LR model, it is quite evident that, ANN models can play an important role for predicting the
driver behavior approaching a road surface deformation. It can be said that, approaching speed plays an
important factor on the lane changing behavior of a driver. This can be criticized by the fact that, drivers
with high approaching speeds more likely pass through the deformation to avoid the accidents while
changing their lanes with a high speed.
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGEScseij
Image binarization is the process of separation of pixel values into two groups, black as background and
white as foreground. Thresholding can be categorized into global thresholding and local thresholding. This
paper describes a locally adaptive thresholding technique that removes background by using local mean
and standard deviation. Most common and simplest approach to segment an image is using thresholding.
In this work we present an efficient implementation for threshoding and give a detailed comparison of
Niblack and sauvola local thresholding algorithm. Niblack and sauvola thresholding algorithm is
implemented on medical images. The quality of segmented image is measured by statistical parameters:
Jaccard Similarity Coefficient, Peak Signal to Noise Ratio (PSNR).
USB Drive Disabler is an application developed in C#.net framework which allows you to block all USB storage devices from accessing your computer.
Instead of blocking the USB devices with Registry command, we can use this application which can make less time requirement, avoid unwanted doubts and sometimes it can also cause data loss in pen drive.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Device to-device communication (pen drive) without pcIJARIIT
In present days, computers and laptops have become an inseparable part of our busy lives. One of the commonly
used devices for data transfers is Universal Serial Bus (USB) flash drives. Due to emerging technology, USB devices are
shrinking in size day by day, but not the equipment’s which is required to access them. Data transfer using portable devices is
the most important factor in today's scenario. Data transfer between two pen drives is generally done using laptops or desktops.
But it is not always possible to carry such a large size device to the particular location. So, to overcome this problem, we are
designing a hardware which is more compact to carry anywhere. With the help of this project we cannot only transfer the data
between devices but also, we can see the transfer of the particular file which we want to send by using LCD display. This
system pen drive to pen drive data transfer without PC is done by using Raspberry Pi. The pen drives are connected to USB
module through USB hub, the communication between two pen drives is done by using Raspberry Pi. Using this System, the
data transfer can be done from any place in the world.
Abstract: In present days, computers and laptops have become an inseparable part of our busy lives. One of the commonly
used devices for data transfers is Universal Serial Bus (USB) flash drives. Due to emerging technology, USB devices are
shrinking in size day by day, but not the equipment’s which is required to access them. Data transfer using portable devices is
the most important factor in today's scenario. Data transfer between two pen drives is generally done using laptops or desktops.
But it is not always possible to carry such a large size device to the particular location. So, to overcome this problem, we are
designing a hardware which is more compact to carry anywhere. With the help of this project we cannot only transfer the data
between devices but also, we can see the transfer of the particular file which we want to send by using LCD display. This
system pen drive to pen drive data transfer without PC is done by using Raspberry Pi. The pen drives are connected to USB
module through USB hub, the communication between two pen drives is done by using Raspberry Pi. Using this System, the
data transfer can be done from any place in the world.
Building Toward an Open and Extensible Autonomous Computing Platform Utilizi...Phil Cryer
NOTE: this was a proposal paper I turned in for consideration, and it was not excepted. I put it here because I still have an interest in implementing many of these ideas, and even after 2 years, they're still needed. Thanks. -- 'Building Toward an Open and Extensible Autonomous Computing Platform Utilizing Existing Technologies' is a paper I wrote for the Third IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2009), which was held June 15, 2009 - Island of Kos, Greece. It contains some of my early ideas of how more autonomous computing systems could use opportunistic networks for communication. Many of these ideas still hold true as I build systems with the goal of having them monitor and repair themselves when a issues arise.
Hostel management system project report..pdfKamal Acharya
“HOSTEL MANAGEMENT SYSTEM” is a software developed for managing various activities in the hostel. For the past few years the number of educational institutions are increasing rapidly. Thereby the number of hostels are also increasing for the accommodation of the students studying in this institution. And hence there is a lot of strain on the person who are running the hostel and software’s are not usually used in this context. This particular project deals with the problems on managing a hostel and avoids the problems which occur when carried manually.
TECHNOLOGY ENHANCED LEARNING WITH OPEN SOURCE SOFTWARE FOR SCIENTISTS AND ENG...Maurice Dawson
This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow Science, Technology, Engineering, & Mathematics (STEM) majors. To do this effectively professors and administrative staff should push toward the utilization of OSS and other available tools to enhance or supplement currently available tools with minimal integration costs. The OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to have students dissect source code, analyze network traffic, create virtual instances of real Operating Systems (OSs), and prepare students for low level software development. It is critical that all institutions look at alternatives in providing training and delivering educational material regardless of limitations going forward as the world continues to be more global due to the increased use of technologies everywhere. Through reviewing the available technology, possible implementations of these technologies, and the application of these items in industry could provide a starting point in integrating these tools into academia. When administrators or faculty debate the possibilities of OSS, gaming, and simulation tools this applied research provides a guide for changing the ability to develop future scientists and engineers that will be competitive on a global level in STEM fields.
Similar to Portable storage device management (20)
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Leading Change strategies and insights for effective change management pdf 1.pdf
Portable storage device management
1. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 4, No.4, August 2014
PORTABLE STORAGE DEVICE MANAGEMENT
IN LINUX
Tushar B. Kute1 and Kabita Ghosh2
1 2Department Department of Information Technology
Sandip Institute of Technology and Research Centre, Nashik
ABSTRACT
The world of information technology and communication is moving towards standardization of hardware
ports. All kind of communication is now using USB as the port as it is universally recognized hardware
medium of data communication. It is become flexible and easy to use kind of things with portable USB
storage devices to copy data from one system to another system. It is possible to copy data within seconds
with the help of portable USB flash memory devices. It has leaded insecurity of data storage on computer
system. Various surveys has shown after network copy only USB data copy has made data insecure on
computer . It is also the source of malwares in the system. To disable the USB ports is not the solution to
this problem because almost all peripheral devices now uses the USB ports for communication. So, we have
implemented a system which has complete USB storage enable and disable control for Linux operating
system. The administrator will decide the storage devices connected to USB must be enabled or disabled .
We experimented the algorithm on Linux kernel version 3.11 onwards on Debian based linux distributions.
We have got 100% success rate of the said system with zero percent performance degradation.
KEYWORDS
Linux, Debian, USB storage, portable storage.
1. INTRODUCTION
With the rapid development of IT, the communication medium has changed a lot. As
communication is very important aspect of each and every work, the medium of communication
has to be more efficient and more secure. Now-a-days we all had been using the USB as a port for
communication. for example communication between user and computers, communication
between mobile and computers etc. All the peripheral hardware devices are also connected using
the USB ports. So that is the reason the USB as a port are more put forward to standardisation.
The most important thing that is storing of a data is also done with the USB storage devices. It
makes easy to accessible to the host computing device to enable the file transfer between the two.
When the USB storage devices are attached to the host computing device it appears as an external
drive, to store the data. Like to copy data from one computer to another and from one computer
to any storage devices. The demand for these USB storage devices has been tremendously
increased. The manufacturers had also increased their production rate of these storage devices
with more data storage space. But with all these flexibility, risks has also come into addition. As
DOI : 10.5121/cseij.2014.4401 1
2. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 4, No.4, August 2014
we are mostly using USB storage devices to transfer data or to keep backup of data, it can lead to
the leakage of data. The leakage of data makes the information insecurity. This flexibility of
directly accessible of copying any data from the host computing device can make the insecurity of
the data. It allows the unauthorised users to access the data and copy the data from your
computing device and misuse it in any ways. As now the companies in particular are at more
risk when any sensitive data are easily copied with the help of these USB storage devices by the
employees and taken out of the office and misuse it or being given to any other companies. This
can lead to deal with the worst consequences of losing the information that can include the
customer data, business plans, financial information or some confidential documented
information about company. The another risk which can lead to information loss is computer
virus and other malicious software. As easily we can transfer the files between the USB storage
device and the computing device at the same point of easiness the viruses can be transfer from the
USB device to your computing devices. These devices has become the primary means of
transmission of viruses and malware. Whenever the malware gets onto your storage device it
may infect your computing devices as the USB drive is subsequently plugged. These viruses and
any malicious software can corrupt your data which leads to data loss. If someone intentionally
wants to corrupt all your data it just needs to plugged the storage device which contains the
viruses and transfer it to your computing device. Now a days the loss of data is mainly through
the computer viruses as told by the most of the surveys. For all these reasons of information
insecurity, USB drives are used in a wrong manner. As information is the most valuable asset, it
has to be more secure and confidential. To make the data more secure on your computers, one
way is that to disable the USB ports so that no USB storage device can be plugged to your
computer . But now a days almost all peripheral devices uses the USB ports for communication.
So this cannot be the option to deal with the information insecurity. So in this paper a new way
has been described which can be use to make our data more secure on our systems. This method
has been experimented and the success rate is 100% with the 0% performance degradation. This
idea has been implemented on the Linux platform which are Debian based distros and the kernel
version 3.9 onwards.[2] The idea is like only to disable the USB mass storage devices by doing
some simple steps. As in Linux, only the root user has all type of authority so it can decide which
user should use the USB ports for storage devices or which users should not have the privileges to
plugged their mass storage devices and use it. This method can definitely improve the security of
the information without losing the data and without corruption of data by any unauthorized users
or by some harmful viruses.
2
2. LITERATURE SURVEY
As the part of academics, we take practical examination of students regularly every semester.
While conduction of these examinations, we have observed that some students have tendency to
copy the program from usb pen drives or through any other usb storage device. We searched the
techniques to find the solution on it. We got several techniques to access and use the usb ports.
These are summarized below.[5]
The general technique to access the usb storage device [4] is with the help of commands. The
command of Linux that is, usb-devices gives the listing of everything about the usb such as,
T: Bus=01 Lev=00 Prnt=00 Port=00 Cnt=00 Dev#= 1 Spd=480 MxCh= 4
D: Ver= 2.00 Cls=09(hub ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1
3. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 4, No.4, August 2014
3
P: Vendor=1d6b ProdID=0002 Rev=03.11
S: Manufacturer=Linux 3.11.0-19-generic ehci_hcd
S: Product=EHCI Host Controller
S: SerialNumber=0000:00:1a.7
C: #Ifs= 1 Cfg#= 1 Atr=e0 MxPwr=0mA
I: If#= 0 Alt= 0 #EPs= 1 Cls=09(hub ) Sub=00 Prot=00 Driver=hub
Such kind of information is made available using the command but its is difficult and almost not
possible to know about usb storage devices connected to the system.
3. ARCHITECTURE
The method of disabling the USB ports for mass storage devices is constiting of set of Linux
kernel activities that has to be included in some of the configuration files and your USB storage
devices will not be detected. This method can be done only through the root account or with the
help of root permission of administrator account.[4]
Fig.1 Account types in Linux.
The root in Linux has highest privilege rights than any other user. Administrator has middle
privileges. It means in order to do any administrative activity it need the password. This is
referred as sudoer rights. Sudo implies- Super User Do. The limited account user 'limuser' is not
having rights to do any administrative activity in the system. [2]
Step-1:
blacklist usb_storage
4. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 4, No.4, August 2014
in blacklist.conf file. This configuration file reside in the /modprobe.d directory which in turn
reside in the /etc directory.[2]
4
Fig.2 The Linux directory structure.[4]
The /etc means the directory etc is residing under root i.e. / represents the root. Almost every
system related configuration files are present in the /etc directory or in its sub-directories. These
configuration files controls the operation of program. The modprobe.d indicates that modprobe is
a directory. The modprobe is a program which adds or removes more than one module, because
one module may have many dependencies, so this program is required for adding or removing
multiple modules. This modprobe.d contains many .conf extension files which specifies many
options that are required to be used with the modules that are to added or removed from the
kernel. The format of the .conf file underneath modprobe.d directory is very simple. It just
includes one line command to configure a program and some comments regarding the command
which starts from the “# “. The modprobe.d directory include a file, name blacklist.conf file
which specifies the modules that has to be ignored from loading. This file helps to stop
performing any operation that you don't want by not loading the modules. In blacklist.conf file, if
you want to disable some operation, the keyword blacklist is used. This keyword blacklist means
all of a particular module specified is ignored. In this file if you want to disable the operation,
you have to use the blacklist keyword followed by the name of the module. As in this paper we
are concentrating in disabling the USB storage devices so the above command i.e. blacklist
keyword followed by the module name usb_storage is used. This will prevent the modprobe
program for loading the USB storage driver upon demand. The usb_storage is a module related to
the USB storage devices [1]. The device drivers is the bridge between the user space applications
and the hardware space. Linux kernel constantly scans all your computer buses for any changes
and new hardware. Whenever the device is attached, the hardware detection is done by the USB
host controller. The device signals the motherboard and the USB chip controller gets the message
and says the information to the kernel with the help of an interrupt. The kernel then re-initialise
the USB bus and says it to the udev that some new device is attached. The device can be detected
by there identity as like all the devices have a vendor name and a model id. Then the kernel uses
the modprobe program to load the driver and says the udev that there is a device of so and so
vendor and model number and then the udev tries to mount the device. As discussed that the
kernel invokes the modprobe program to load the drivers and modules, the modprobe program
will search the configuration file whether the driver is listed or not and when it is found that the
module is listed as a blacklist then the modprobe fails to load the module and the kernel could not
send any information about the device and the udev could not mount the device on your system.
5. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 4, No.4, August 2014
5
Step-2:
modprobe -r usb_storage
in the rc.local file which is under the /etc directory. The /etc/rc.local file is common to all major
distributions. This file is empty on fresh installation and it is reserved for local administrators.
The rc.local is a script file which contains any specific commands for the system that runs
whenever the system startup. This file runs at the end of the system boot process, so the
commands that we want to run at the time of system startup can be written in this file. The rc
denotes the runcom or run command. This file can be helpful to write the commands that you
want to execute at every boot time. In this file as the above command modprobe is used which
helps to add or remove the modules and the dependent modules also. The kernel also depends on
modprobe program to load or unload a module. There are many options that can be used with
modprobe command like -a, -i etc, so the option -r is used in the above command which is used to
remove the modules. This option is used to remove the modules and also try to remove the
unused modules which are dependent on it. As whenever the storage devices are attach, the
usb_storage module gets loaded which is a module related to mass storage devices and that
module is used by those devices. You can see that the usb_storage module has been loaded by
using the lsmod command and how many mass storage devices are attached and has used that
module. This lsmod command shows the contents of the modules file under the /proc directory
and the contents are the loadable kernel modules that are currently loaded on your system. So to
remove that usb_storage module the modprobe program is used with -r option. To remove or
unload any module you can use the modprobe program with -r option followed by the module
name like usb_storage. When the system boots, at the end of all the initialization done, the
rc.local file under the /etc directory gets executed and the modprobe command gets call and the
usb_storage module gets unloaded.
And if we just unload the usb_storage module without including the usb_stoarge module in the
blacklist.conf file then the mass storage devices get mount whenever attach because it reloads the
module that had been already unloaded. So to make it persistent, the usb_storage module must be
include in the blacklist.conf file, thus restricting the module to get reload as the usb_storage
module is blacklisted.
Now if we want to enable the USB mass storage devices, i.e. the storage devices to get mount we
have to just remove the commands that we have added in the blacklist.conf file under the
/etc/modprobe.d directory and the rc.local file under the /etc file. As the commands are removed
and we attached the storage device to the system the usb_storage module get reloaded and the
USB storage device get mount and can be used as normally we do use.
4. CONCLUSION
In this paper, we have implemented a system which will control the portable USB mass storage
devices according to the administrator or root authority. The administrator can decide whether to
enable or to disable the USB storage devices of the system. As a result, after disabling the USB
storage devices, those devices cannot get detected and the malicious activity or malwares through
these storage devices can be fully controlled by the administrator or root authority by preventing
the system or confidential information to get leak or corrupt by some unauthorized users.
6. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 4, No.4, August 2014
6
REFERENCES
[1] Disabling USB storage drives, March 2008, National Security Agency, USA department of
defense.
[2] Defense against Malware on Removable Media, National Security Agency, USA department of
defense.
[3] USB Debugging and Profiling Techniques Kishon Vijay, Abraham I, and Basak Partha, Texas
Instruments, Published on http://elinux.org
[4] Robert Love; "Linux Kernel Development", 3rd Edition.
[5] Manual pages of Linux/Unix security commands.
Authors
Tushar B. Kute is working as Assistant Professor in Information Technology at Sandip Institute
of Technology and Research Centre, Nashik, Maharashtra.His area of interest includes the
Linux Kernel Development.
Kabita K. Ghosh is student of B.E. Information Technology at Sandip Institute of Technology and
Research Centre, Nashik, Maharashtra. Her area of inte rest includes the Linux Kernel
Development.