Abstract: Recently, grid computing has been widely focused on
the science, industry, and business fields, which are required a vast
amount of computing. Grid computing is to provide the environment
that many nodes (i.e., many computers) are connected with each
other through a local/global network and it is available for many
users. In the environment, to achieve data processing among nodes
for any applications, each node executes mutual authentication by
using certificates which published from the Certificate Authority
(for short, CA). However, if a failure or fault has occurred in the
CA, any new certificates cannot be published from the CA. As
a result, a new node cannot participate in the gird environment.
In this paper, an off-the-shelf scheme for dependable grid systems
using virtualization techniques is proposed and its implementation is
verified. The proposed approach using the virtualization techniques
is to restart an application, e.g., the CA, if it has failed. The system
can tolerate a failure or fault if it has occurred in the CA. Since
the proposed scheme is implemented at the application level easily,
the cost of its implementation by the system builder hardly takes
compared it with other methods. Simulation results show that the
CA in the system can recover from its failure or fault.
Abstract: The main goal of the article is to present new model of
application architecture of banking IT solution providing the Internet
Banking services that is particularly outsourced. At first, we propose
business rationale and a SWOT analysis to explain the reasons for the
model in the article. The most important factor for our model is
nowadays- big boom around smart phones and tablet devices. As
next, we focus on IT architecture viewpoint where we design
application, integration and security model. Finally, we propose a
generic governance model that serves as a basis for the specialized
governance model. The specialized instance of governance model is
designed to ensure that the development and the maintenance of
different parts of the IT solution are well governed in time.
Abstract: A separation-kernel-based operating system (OS) has been designed for use in secure embedded systems by applying formal methods to the design of the separation-kernel part. The separation kernel is a small OS kernel that provides an abstract distributed environment on a single CPU. The design of the separation kernel was verified using two formal methods, the B method and the Spin model checker. A newly designed semi-formal method, the extended state transition method, was also applied. An OS comprising the separation-kernel part and additional OS services on top of the separation kernel was prototyped on the Intel IA-32 architecture. Developing and testing of a prototype embedded application, a point-of-sale application, on the prototype OS demonstrated that the proposed architecture and the use of formal methods to design its kernel part are effective for achieving a secure embedded system having a high-assurance separation kernel.
Abstract: The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi tier task (routing and secure exchange of information at separate levels). Our endeavor in this paper would focus on achieving the routing and secure data exchange in a single step. This will facilitate the user nodes to perform routing, mutual authentications, generation and secure exchange of session key in one step thus ensuring confidentiality, integrity and authentication of data exchange in a more suitable way.
Abstract: Five crystal modifications of water insoluble
artesunate were generated by recrystallizing it from various solvents
with improved physicochemical properties. These generated crystal
forms were characterized to select the most potent and soluble form.
SEM of all the forms showed changes in external shape leading them
to be different morphologically. DSC thermograms of Form III and
Form V showed broad endotherm peaks at 83.04oC and 76.96oC prior
to melting fusion of drug respectively. Calculated weight loss in TGA
revealed that Form III and Form V are methanol and acetone solvates
respectively. However, few additional peaks were appeared in XRPD
pattern in these two solvate forms. All forms exhibit exothermic
behavior in buffer and two solvates display maximum ease of
molecular release from the lattice. Methanol and acetone solvates
were found to be most soluble forms and exhibited higher
antimalarial efficacy showing higher survival rate (83.3%) after 30
days.
Abstract: WebGL is typically used with web browsers. In this
paper, we represent a standalone WebGL execution environment,
where the original WebGL source codes show the same result to those
of WebGL-capable web browsers. This standalone environment
enables us to run WebGL programs without web browsers and/or
internet connections. Our implementation shows the same rendering
results with typical web browser outputs. This standalone environment
is suitable for low-tier devices and/or debugging purposes.
Abstract: The impact of noise upon live quality has become an
important aspect to make both urban and environmental policythroughout
Europe and in Turkey. Concern over the quality of urban
environments, including noise levels and declining quality of green
space, is over the past decade with increasing emphasis on designing
livable and sustainable communities. According to the World Health
Organization, noise pollution is the third most hazardous
environmental type of pollution which proceeded by only air (gas
emission) and water pollution. The research carried out in two
phases, the first stage of the research noise and plant types providing
the suction of noise was evaluated through literature study and at the
second stage, definite types (Juniperus horizontalis L., Spirea
vanhouetti Briot., Cotoneaster dammerii C.K., Berberis thunbergii
D.C., Pyracantha coccinea M. etc.) were selected for the city of
Konya. Trials were conducted on the highway of Konya. The biggest
value of noise reduction was 6.3 dB(A), 4.9 dB(A), 6.2 dB(A) value
with compared to the control which includes the group that formed
by the bushes at the distance of 7m, 11m, 20m from the source and
5m, 9m, 20m of plant width, respectively. In this paper, definitions
regarding to noise and its sources were made and the precautions
were taken against to noise that mentioned earlier with the adverse
effects of noise. Plantation design approaches and suggestions
concerning to the diversity to be used, which are peculiar to roadside,
were developed to discuss the role and the function of plant material
to reduce the noise of the traffic.
Abstract: Majority of researches conducted on Iranian urban
development plans indicate that they have been almost unsuccessful
in terms of draft, execution and goal achievement. Lack or shortage
of essential statistics and information can be listed as an important
reason of the failure of these plans. Lack of figures and information
has turned into an obvious part of the country-s statistics officials.
This problem has made urban planner themselves to embark on
physical surveys including real estate and land pricing, population
and economic census of the city. Apart from the problems facing
urban developers, the possibility of errors is high in such surveys.
In the present article, applying the interview technique, it has
been mentioned that utilizing multipurpose cadastre system as a land
information system is essential for urban development plans in Iran.
It can minimize or even remove the failures facing urban
development plans.
Abstract: This study examined the effects of eight weeks of
whole-body vibration training (WBVT) on vertical and decuple jump
performance in handball athletes. Sixteen collegiate Level I handball
athletes volunteered for this study. They were divided equally as
control group and experimental group (EG). During the period of the
study, all athletes underwent the same handball specific training, but
the EG received additional WBVT (amplitude: 2 mm, frequency: 20 -
40 Hz) three time per week for eight consecutive weeks. The vertical
jump performance was evaluated according to the maximum height of
squat jump (SJ) and countermovement jump (CMJ). Single factor
ANCOVA was used to examine the differences in each parameter
between the groups after training with the pretest values as a covariate.
The statistic significance was set at p < .05. After 8 weeks WBVT, the
EG had significantly improved the maximal height of SJ (40.92 ± 2.96
cm vs. 48.40 ± 4.70 cm, F = 5.14, p < .05) and the maximal height
CMJ (47.25 ± 7.48 cm vs. 52.20 ± 6.25 cm, F = 5.31, p < .05). 8 weeks
of additional WBVT could improve the vertical and decuple jump
performance in handball athletes. Enhanced motor unit
synchronization and firing rates, facilitated muscular contraction
stretch-shortening cycle, and improved lower extremity
neuromuscular coordination could account for these enhancements.
Abstract: RC4 was used as an encryption algorithm in WEP(Wired Equivalent Privacy) protocol that is a standardized for 802.11 wireless network. A few attacks followed, indicating certain weakness in the design. In this paper, we proposed a new variant of RC4 stream cipher. The new version of the cipher does not only appear to be more secure, but its keystream also has large period, large complexity and good statistical properties.
Abstract: During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.
Abstract: Power Spectral Density (PSD) of quasi-stationary processes can be efficiently estimated using the short time Fourier series (STFT). In this paper, an algorithm has been proposed that computes the PSD of quasi-stationary process efficiently using offline autoregressive model order estimation algorithm, recursive parameter estimation technique and modified sliding window discrete Fourier Transform algorithm. The main difference in this algorithm and STFT is that the sliding window (SW) and window for spectral estimation (WSA) are separately defined. WSA is updated and its PSD is computed only when change in statistics is detected in the SW. The computational complexity of the proposed algorithm is found to be lesser than that for standard STFT technique.
Abstract: This study investigated a strategy of blending lead-laden sludge and Al-rich precursors to reduce the release of metals from the stabilized products. Using PbO as the simulated lead-laden sludge to sinter with γ-Al2O3 by Pb:Al molar ratios of 1:2 and 1:12, PbAl2O4 and PbAl12O19 were formed as final products during the sintering process, respectively. By firing the PbO + γ-Al2O3 mixtures with different Pb/Al molar ratios at 600 to 1000 °C, the lead transformation was determined through X-ray diffraction (XRD) data. In Pb/Al molar ratio of 1/2 system, the formation of PbAl2O4 is initiated at 700 °C, but an effective formation was observed above 750 °C. An intermediate phase, Pb9Al8O21, was detected in the temperature range of 800-900 °C. However, different incorporation behavior for sintering PbO with Al-rich precursors at a Pb/Al molar ratio of 1/12 was observed during the formation of PbAl12O19 in this system. In the sintering process, both temperature and time effect on the formation of PbAl2O4 and PbAl12O19 phases were estimated. Finally, a prolonged leaching test modified from the U.S. Environmental Protection Agency-s toxicity characteristic leaching procedure (TCLP) was used to evaluate the durability of PbO, Pb9Al8O21, PbAl2O4 and PbAl12O19 phases. Comparison for the leaching results of the four phases demonstrated the higher intrinsic resistance of PbAl12O19 against acid attack.
Abstract: In this research, CaO-ZnO catalysts (with various
Ca:Zn atomic ratios of 1:5, 1:3, 1:1, and 3:1) prepared by incipientwetness
impregnation (IWI) and co-precipitation (CP) methods were
used as a catalyst in the transesterification of palm oil with methanol
for biodiesel production. The catalysts were characterized by several
techniques, including BET method, CO2-TPD, and Hemmett
Indicator. The effects of precursor concentration, and calcination
temperature on the catalytic performance were studied under reaction
conditions of a 15:1 methanol to oil molar ratio, 6 wt% catalyst,
reaction temperature of 60°C, and reaction time of 8 h. At Ca:Zn
atomic ratio of 1:3 gave the highest FAME value owing to a basic
properties and surface area of the prepared catalyst.
Abstract: NFκB is a transcription factor regulating many
function of the vessel wall. In the normal condition , NFκB is
revealed diffuse cytoplasmic expressionsuggesting that the system is
inactive. The presence of activation NFκB provide a potential
pathway for the rapid transcriptional of a variety of genes encoding
cytokines, growth factors, adhesion molecules and procoagulatory
factors. It is likely to play an important role in chronic inflamatory
disease involved atherosclerosis. There are many stimuli with the
potential to active NFκB, including hyperlipidemia. We used 24 mice
which was divided in 6 groups. The HFD given by et libitum
procedure during 2, 4, and 6 months. The parameters in this study
were the amount of NFKB activation ,H2O2 as ROS and VCAM-1 as
a product of NFKB activation. H2O2 colorimetryc assay performed
directly using Anti Rat H2O2 ELISA Kit. The NFKB and VCAM-1
detection obtained from aorta mice, measured by ELISA kit and
imunohistochemistry. There was a significant difference activation of
H2O2, NFKB and VCAM-1 level at induce HFD after 2, 4 and 6
months. It suggest that HFD induce ROS formation and increase the
activation of NFKB as one of atherosclerosis marker that caused by
hyperlipidemia as classical atheroschlerosis risk factor.
Abstract: The wide increase and diffusion on telecommunication
technologies have caused a huge spread of electromagnetic sources
in most European Countries. Since the public is continuously being
exposed to electromagnetic radiation the possible health effects have
become the focus of population concerns. As a result, electromagnetic
field monitoring stations which control field strength in commercial
frequency bands are being placed on the flat roof of many buildings.
However there is no guidance on where to place them. This paper
presents an analysis of frequency, polarization and angles of incidence
of a plane wave which impinges on a flat roof security wall and its
dependence on electromagnetic field strength meters placement.
Abstract: This paper presents the applicability of artificial
neural networks for 24 hour ahead solar power generation forecasting
of a 20 kW photovoltaic system, the developed forecasting is suitable
for a reliable Microgrid energy management. In total four neural
networks were proposed, namely: multi-layred perceptron, radial
basis function, recurrent and a neural network ensemble consisting in
ensemble of bagged networks. Forecasting reliability of the proposed
neural networks was carried out in terms forecasting error
performance basing on statistical and graphical methods. The
experimental results showed that all the proposed networks achieved
an acceptable forecasting accuracy. In term of comparison the neural
network ensemble gives the highest precision forecasting comparing
to the conventional networks. In fact, each network of the ensemble
over-fits to some extent and leads to a diversity which enhances the
noise tolerance and the forecasting generalization performance
comparing to the conventional networks.
Abstract: This paper presents a watermarking protocol able to
solve the well-known “customer-s right problem" and “unbinding
problem". In particular, the protocol has been purposely designed
to be adopted in a web context, where users wanting to buy digital
contents are usually neither provided with digital certificates issued
by certification authorities (CAs) nor able to autonomously perform
specific security actions. Furthermore, the protocol enables users to
keep their identities unexposed during web transactions as well as
allows guilty buyers, i.e. who are responsible distributors of illegal
replicas, to be unambiguously identified. Finally, the protocol has
been designed so that web content providers (CPs) can exploit
copyright protection services supplied by web service providers (SPs)
in a security context. Thus, CPs can take advantage of complex
services without having to directly implement them.
Abstract: Dorsal hand vein pattern is an emerging biometric which is attracting the attention of researchers, of late. Research is being carried out on existing techniques in the hope of improving them or finding more efficient ones. In this work, Principle Component Analysis (PCA) , which is a successful method, originally applied on face biometric is being modified using Cholesky decomposition and Lanczos algorithm to extract the dorsal hand vein features. This modified technique decreases the number of computation and hence decreases the processing time. The eigenveins were successfully computed and projected onto the vein space. The system was tested on a database of 200 images and using a threshold value of 0.9 to obtain the False Acceptance Rate (FAR) and False Rejection Rate (FRR). This modified algorithm is desirable when developing biometric security system since it significantly decreases the matching time.
Abstract: This paper analyzes the extent to which the justices of
the U.S. Supreme Court cast votes that support the positions of the
president, or more generally the Executive Branch. Can presidents
count on such deference from those justices they nominate or those
whom are nominated by other presidents of the same party? Or, do
the justices demonstrate judicial independence and impartiality such
that they are not so predisposed to vote in favor of arguments of their
nominating president-s party? The results suggest that while in
general the justices do not exhibit any marked tendency to partisan
support of presidents, more recent and conservative Supreme Court
justices are significantly more likely to support Republican
presidents.