Abstract: Interactions among proteins are the basis of various
life events. So, it is important to recognize and research protein
interaction sites. A control set that contains 149 protein molecules
were used here. Then 10 features were extracted and 4 sample sets
that contained 9 sliding windows were made according to features.
These 4 sample sets were calculated by Radial Basis Functional neutral
networks which were optimized by Particle Swarm Optimization
respectively. Then 4 groups of results were obtained. Finally, these 4
groups of results were integrated by decision fusion (DF) and Genetic
Algorithm based Selected Ensemble (GASEN). A better accuracy was
got by DF and GASEN. So, the integrated methods were proved to
be effective.
Abstract: Because of increasing demands for security in today-s
society and also due to paying much more attention to machine
vision, biometric researches, pattern recognition and data retrieval in
color images, face detection has got more application. In this article
we present a scientific approach for modeling human skin color, and
also offer an algorithm that tries to detect faces within color images
by combination of skin features and determined threshold in the
model. Proposed model is based on statistical data in different color
spaces. Offered algorithm, using some specified color threshold, first,
divides image pixels into two groups: skin pixel group and non-skin
pixel group and then based on some geometric features of face
decides which area belongs to face.
Two main results that we received from this research are as follow:
first, proposed model can be applied easily on different databases and
color spaces to establish proper threshold. Second, our algorithm can
adapt itself with runtime condition and its results demonstrate
desirable progress in comparison with similar cases.
Abstract: In this paper a unified approach via block-pulse functions (BPFs) or shifted Legendre polynomials (SLPs) is presented to solve the linear-quadratic-Gaussian (LQG) control problem. Also a recursive algorithm is proposed to solve the above problem via BPFs. By using the elegant operational properties of orthogonal functions (BPFs or SLPs) these computationally attractive algorithms are developed. To demonstrate the validity of the proposed approaches a numerical example is included.
Abstract: A four element prototype phased array surface probe
has been designed and constructed to improve clinical human
prostate spectroscopic data. The probe consists of two pairs of
adjacent rectangular coils with an optimum overlap to reduce the
mutual inductance. The two pairs are positioned on the anterior and
the posterior pelvic region and two couples of varactors at the input
of each coil undertake the procedures of tuning and matching. The
probe switches off and on automatically during the consecutive
phases of the MR experiment with the use of an analog switch that is
triggered by a microcontroller. Experimental tests that were carried
out resulted in high levels of tuning accuracy. Also, the switching
mechanism functions properly for various applied loads and pulse
sequence characteristics, producing only 10 μs of latency.
Abstract: The security of power systems against malicious cyberphysical
data attacks becomes an important issue. The adversary
always attempts to manipulate the information structure of the power
system and inject malicious data to deviate state variables while
evading the existing detection techniques based on residual test. The
solutions proposed in the literature are capable of immunizing the
power system against false data injection but they might be too costly
and physically not practical in the expansive distribution network.
To this end, we define an algebraic condition for trustworthy power
system to evade malicious data injection. The proposed protection
scheme secures the power system by deterministically reconfiguring
the information structure and corresponding residual test. More
importantly, it does not require any physical effort in either microgrid
or network level. The identification scheme of finding meters being
attacked is proposed as well. Eventually, a well-known IEEE 30-bus
system is adopted to demonstrate the effectiveness of the proposed
schemes.
Abstract: This paper adopted the hybrid differential transform approach for studying heat transfer problems in a gold/chromium thin film with an ultra-short-pulsed laser beam projecting on the gold side. The physical system, formulated based on the hyperbolic two-step heat transfer model, covers three characteristics: (i) coupling effects between the electron/lattice systems, (ii) thermal wave propagation in metals, and (iii) radiation effects along the interface. The differential transform method is used to transfer the governing equations in the time domain into the spectrum equations, which is further discretized in the space domain by the finite difference method. The results, obtained through a recursive process, show that the electron temperature in the gold film can rise up to several thousand degrees before its electron/lattice systems reach equilibrium at only several hundred degrees. The electron and lattice temperatures in the chromium film are much lower than those in the gold film.
Abstract: This paper studies the dependability of componentbased
applications, especially embedded ones, from the diagnosis
point of view. The principle of the diagnosis technique is to
implement inter-component tests in order to detect and locate the
faulty components without redundancy. The proposed approach for
diagnosing faulty components consists of two main aspects. The first
one concerns the execution of the inter-component tests which
requires integrating test functionality within a component. This is the
subject of this paper. The second one is the diagnosis process itself
which consists of the analysis of inter-component test results to
determine the fault-state of the whole system. Advantage of this
diagnosis method when compared to classical redundancy faulttolerant
techniques are application autonomy, cost-effectiveness and
better usage of system resources. Such advantage is very important
for many systems and especially for embedded ones.
Abstract: Considering payload, reliability, security and operational lifetime as major constraints in transmission of images we put forward in this paper a steganographic technique implemented at the physical layer. We suggest transmission of Halftoned images (payload constraint) in wireless sensor networks to reduce the amount of transmitted data. For low power and interference limited applications Turbo codes provide suitable reliability. Ensuring security is one of the highest priorities in many sensor networks. The Turbo Code structure apart from providing forward error correction can be utilized to provide for encryption. We first consider the Halftoned image and then the method of embedding a block of data (called secret) in this Halftoned image during the turbo encoding process is presented. The small modifications required at the turbo decoder end to extract the embedded data are presented next. The implementation complexity and the degradation of the BER (bit error rate) in the Turbo based stego system are analyzed. Using some of the entropy based crypt analytic techniques we show that the strength of our Turbo based stego system approaches that found in the OTPs (one time pad).
Abstract: A robust wheel slip controller for electric vehicles is
introduced. The proposed wheel slip controller exploits the dynamics
of electric traction drives and conventional hydraulic brakes for
achieving maximum energy efficiency and driving safety. Due to
the control of single wheel traction motors in combination with a
hydraulic braking system, it can be shown, that energy recuperation
and vehicle stability control can be realized simultaneously. The
derivation of a sliding mode wheel slip controller accessing two
drivetrain actuators is outlined and a comparison to a conventionally
braked vehicle is shown by means of simulation.
Abstract: The adaptive power control of Code Division Multiple
Access (CDMA) communications using Remote Radio Head
(RRH) between multiple Unmanned Aerial Vehicles (UAVs) with
a link-budget based Signal-to-Interference Ratio (SIR) estimate is
applied to four inner loop power control algorithms. It is concluded
that Base Station (BS) can calculate not only UAV distance using
linearity between speed and Consecutive Transmit-Power-Control
Ratio (CTR) of Adaptive Step-size Closed Loop Power Control (ASCLPC),
Consecutive TPC Ratio Step-size Closed Loop Power Control
(CS-CLPC), Fixed Step-size Power Control (FSPC), but also UAV
position with Received Signal Strength Indicator (RSSI) ratio of
RRHs.
Abstract: Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodologies leading to the selection of a proper methodology to fulfill these requirements. Then, a detailed analysis of the most effective methodology is accomplished, presenting numerical examples to demonstrate how easy it is to use.
Abstract: This paper presents the results of the authors in designing, experimenting, assessing and transferring an innovative approach to energy education in secondary schools, aimed to enhance the quality of learning in terms of didactic curricula and pedagogic methods. The training is online delivered to youngsters via e-Books and portals specially designed for this purpose or by learning by doing via interactive games. An online educational methodology is available teachers.
Abstract: In this paper we present a combined
hashing/watermarking method for image authentication. A robust
image hash, invariant to legitimate modifications, but fragile to
illegitimate modifications is generated from the local image
characteristics. To increase security of the system the watermark is
generated using the image hash as a key. Quantized Index
Modulation of DCT coefficients is used for watermark embedding.
Watermark detection is performed without use of the original image.
Experimental results demonstrate the effectiveness of the presented
method in terms of robustness and fragility.
Abstract: As mobile ad hoc networks (MANET) have different
characteristics from wired networks and even from standard wireless
networks, there are new challenges related to security issues that
need to be addressed. Due to its unique features such as open nature,
lack of infrastructure and central management, node mobility and
change of dynamic topology, prevention methods from attacks on
them are not enough. Therefore intrusion detection is one of the
possible ways in recognizing a possible attack before the system
could be penetrated. All in all, techniques for intrusion detection in
old wireless networks are not suitable for MANET. In this paper, we
classify the architecture for Intrusion detection systems that have so
far been introduced for MANETs, and then existing intrusion
detection techniques in MANET presented and compared. We then
indicate important future research directions.
Abstract: The nature of adsorbed species on catalytic surface
over an industrial precipitated iron-based high temperature catalyst
during FTS was investigated by in-situ DRIFTS and chemical
trapping. The formulation of the mechanism of oxygenates formation
and key intermediates were also discussed. Numerous oxygenated
precursors and crucial intermediates were found by in-situ DRIFTS,
such as surface acetate, acetyl and methoxide. The results showed that
adsorbed molecules on surface such as methanol or acetaldehyde
could react with basic sites such as lattice oxygen or free surface
hydroxyls. Adsorbed molecules also had reactivity of oxidizing.
Moreover, acetyl as a key intermediate for oxygenates was observed
by investigation of CH3OH + CO and CH3I + CO + H2. Based on the
nature of surface properties, the mechanism of oxygenates formation
on precipitated iron-based high temperature catalyst was discussed.
Abstract: Rice seed expression (cDNA) library in the Lambda
Zap 11® phage constructed from the developing grain 10-20 days
after flowering was transformed into yeast for functional
complementation assays in three salt sensitive yeast mutants S.
cerevisiae strain CY162, G19 and Axt3K. Transformed cells of G19
and Axt3K with pYES vector with cDNA inserts showed enhance
tolerance than those with empty pYes vector. Sequencing of the
cDNA inserts revealed that they encode for the putative proteins with
the sequence homologous to rice putative protein PROLM24
(Os06g31070), a prolamin precursor. Expression of this cDNA did
not affect yeast growth in absence of salt. Axt3k and G19 strains
expressing the PROLM24 were able to grow upto 400 mM and 600
mM of NaCl respectively. Similarly, Axt3k mutant with PROLM24
expression showed comparatively higher growth rate in the medium
with excess LiCl (50 mM). The observation that expression of
PROLM24 rescued the salt sensitive phenotypes of G19 and Axt3k
indicates the existence of a regulatory system that ameliorates the
effect of salt stress in the transformed yeast mutants. However, the
exact function of the cDNA sequence, which shows partial sequence
homology to yeast UTR1 is not clear. Although UTR1 involved in
ferrous uptake and iron homeostasis in yeast cells, there is no
evidence to prove its role in Na+ homeostasis in yeast cells. Absence
of transmembrane regions in Os06g31070 protein indicates that salt
tolerance is achieved not through the direct functional
complementation of the mutant genes but through an alternative
mechanism.
Abstract: Cosmic showers, during the transit through space, produce
sub - products as a result of interactions with the intergalactic
or interstellar medium which after entering earth generate secondary
particles called Extensive Air Shower (EAS). Detection and analysis
of High Energy Particle Showers involve a plethora of theoretical and
experimental works with a host of constraints resulting in inaccuracies
in measurements. Therefore, there exist a necessity to develop a
readily available system based on soft-computational approaches
which can be used for EAS analysis. This is due to the fact that soft
computational tools such as Artificial Neural Network (ANN)s can be
trained as classifiers to adapt and learn the surrounding variations. But
single classifiers fail to reach optimality of decision making in many
situations for which Multiple Classifier System (MCS) are preferred
to enhance the ability of the system to make decisions adjusting
to finer variations. This work describes the formation of an MCS
using Multi Layer Perceptron (MLP), Recurrent Neural Network
(RNN) and Probabilistic Neural Network (PNN) with data inputs
from correlation mapping Self Organizing Map (SOM) blocks and
the output optimized by another SOM. The results show that the setup
can be adopted for real time practical applications for prediction
of primary energy and location of EAS from density values captured
using detectors in a circular grid.
Abstract: Since communications between tag and reader in RFID
system are by radio, anyone can access the tag and obtain its any
information. And a tag always replies with the same ID so that it is
hard to distinguish between a real and a fake tag. Thus, there are many
security problems in today-s RFID System. Firstly, unauthorized
reader can easily read the ID information of any Tag. Secondly,
Adversary can easily cheat the legitimate reader using the collected
Tag ID information, such as the any legitimate Tag. These security
problems can be typically solved by encryption of messages
transmitted between Tag and Reader and by authentication for Tag.
In this paper, to solve these security problems on RFID system, we
propose the Tag Authentication Scheme based on self shrinking
generator (SSG). SSG Algorithm using in our scheme is proposed by
W.Meier and O.Staffelbach in EUROCRYPT-94. This Algorithm is
organized that only one LFSR and selection logic in order to generate
random stream. Thus it is optimized to implement the hardware logic
on devices with extremely limited resource, and the output generating
from SSG at each time do role as random stream so that it is allow our
to design the light-weight authentication scheme with security against
some network attacks. Therefore, we propose the novel tag
authentication scheme which use SSG to encrypt the Tag-ID
transmitted from tag to reader and achieve authentication of tag.
Abstract: Abstract–The objectives of the current study are to determine the
prevalence, etiological agents, drug susceptibility pattern and plasmid
profile of Acinetobacter baumannii isolates from Hospital-Acquired
Infections (HAI) at Community Hospital, Al Jouf Province, Saudi
Arabia. A total of 1890 patients had developed infection during
hospital admission and were included in the study. Among those who
developed nosocomial infections, 15(9.4), 10(2.7) and 118 (12.7) had
respiratory tract infection (RTI), blood stream infections (BSI) and
urinary tract (UTI) respectively. A total of 268 bacterial isolates were
isolated from nosocomial infection. S. aureus was reported in 23.5%
for of the total isolates followed by Klebsiella pneumoniae (17.5%), E.
coli (17.2%), P. aeruginosa (11.9%), coagulase negative
staphylococcus (9%), A. baumannii (7.1%), Enterobacter spp.
(3.4%), Citrobacter freundii (3%), Proteus mirabilis (2.6%), and
Proteus vulgaris and Enterococcous faecalis (0.7%). Isolated
organisms are multi-drug resistant, predominantly Gram-positive
pathogens with a high incidence of methicillin-resistant S. aureus,
extended spectrum beta lactamase and vancomycin resistant
enterococci organisms. The RFLP (Fragment Length Polymorphisms)
patterns of plasmid preparations from isolated A. baumannii isolates
had altered RFLP patterns, possibly due to the presence of plasmid(s).
Five A. baumannii isolates harbored plasmids all of which were not
less than 2.71kbp in molecular weight. Hence, it showed that the gene
coding for the isolates were located on the plasmid DNA while the
remaining isolates which have no plasmid might showed gene coding
for antibiotic resistance being located on chromosomal DNA.
Nosocomial infections represent a current problem in Community
Hospital, Al Jouf Province, Saudi Arabia. Problems associated with
SSI include infection with multidrug resistant pathogens which are
difficult to treat and are associated with increased mortality.
Abstract: Wireless Sensor networks have a wide spectrum of civil and military applications that call for secure communication such as the terrorist tracking, target surveillance in hostile environments. For the secure communication in these application areas, we propose a method for generating a hierarchical key structure for the efficient group key management. In this paper, we apply A* algorithm in generating a hierarchical key structure by considering the history data of the ratio of addition and eviction of sensor nodes in a location where sensor nodes are deployed. Thus generated key tree structure provides an efficient way of managing the group key in terms of energy consumption when addition and eviction event occurs. A* algorithm tries to minimize the number of messages needed for group key management by the history data. The experimentation with the tree shows efficiency of the proposed method.