Information-hiding techniques have newly become very important in a many application areas. Many cover mediums have been used to hide information like image, video, voice. Use of these mediums have been extensively studied. In this paper, we propose new system for hiding information in Portable Executable files (PE files). PE is a file format for executable file used in the 32-bit and 64-bit versions of the Windows operating system. This algorithm has higher security than some traditional ones because of the combination between encryption and hiding. We first encrypt the information before hiding it to ensure high security. After that we hide the information in the import table of PE file. This hiding depends on analyzing the import table characteristics of PE files that have been built under Borland turbo assembler. The testing result shows that the result file does not make any inconsistency with anti-virus programs and the PE file still function as normal after the hiding process.
Keywords: - PE File, Information Hiding, Cryptography.
Recently, too much data is being produced in every field of our life. Especially in science, large amounts of data are needed to analyze in order to reveal valuable knowledge hidden in raw data. The number of DNA sequences has been growing fast since the beginning of the Human Genome Program (HGP) so it becomes increasingly important to automate the identification of functional elements in DNA. But human analysts with the traditional tools can no longer make sense. In this study, we employ data mining techniques including ANN, ANFIS and newly developed algorithms ke-REM and IREM to extract diamonds of knowledge from DNA sequences and evaluate their performances.
Keywords: -Promoter prediction, ANN, ANFIS, ke-REM, IREM,data mining, bioinformatics, DNA
Supply chain risks, vulnerabilities, complexity and uncertainties have emerged as key challenges to supply chain management. Supply chain risk management assumes importance in making the organizations understand that their risk sensitivity is dependent on other constituents of their supply chain. These risks are prone to disruptions, Forecast inaccuracies, breakdowns, economic and political changes, and disasters leading to higher risks and making supply chain management difficult. The present study categorized and refined the supply chain risks sources and its mitigation strategies for dealing with these risks. Fuzzy Analytical hierarchical process was utilized to determine the relative weights of risks which are subsequently used to rank the risk on the basis of their impact on supply chain. Understanding the priorities would help the firm to accord importance and develop suitable strategies to manage supply chain risks.
Keywords: - Supply Chain Risk, AHP, Fuzzy AHP
© 2019 All Rights Reserved | Design by iosrjen