Abstract: Recent advances in wireless sensor networks have led
to many routing methods designed for energy-efficiency in wireless
sensor networks. Despite that many routing methods have been
proposed in USN, a single routing method cannot be energy-efficient
if the environment of the ubiquitous sensor network varies. We present
the controlling network access to various hosts and the services they
offer, rather than on securing them one by one with a network security
model. When ubiquitous sensor networks are deployed in hostile
environments, an adversary may compromise some sensor nodes and
use them to inject false sensing reports. False reports can lead to not
only false alarms but also the depletion of limited energy resource in
battery powered networks. The interleaved hop-by-hop authentication
scheme detects such false reports through interleaved authentication.
This paper presents a LMDD (Low energy method for data delivery)
algorithm that provides energy-efficiency by dynamically changing
protocols installed at the sensor nodes. The algorithm changes
protocols based on the output of the fuzzy logic which is the fitness
level of the protocols for the environment.
Abstract: This paper focuses upon three such painters working in
France from this time and their representations both of their host
country in which they found themselves displaced, and of their
homeland which they represent through refracted memories from their
new perspective in Europe. What is their representation of France and
China´╝ÅTaiwan? Is it Otherness or an origin?
This paper also attempts to explore the three artists- diasporic lives
and to redefine their transnational identities. Hou Chin-lang, the
significance of his multiple-split images serve to highlight the intricate
relationships between his work and the surrounding family, and to
reveal his identity of his Taiwan “homeland". Yin Xin takes paintings
from the Western canon and subjects them to a process of
transformation through Chinese imagery. In the same period, Lin
Li-ling, transforms the transnational spirit of Yin Xin to symbolic
codes with neutered female bodies and tatoos, thus creates images that
challenge the boundaries of both gender and nationality.
Abstract: In this study, three subtypes of influenza A viruses (pH1N1, H5N1 and H3N2) which naturally infected human were analyzed by bioinformatic approaches to find candidate human cellular miRNAs targeting viral genomes. There were 76 miRNAs targeting influenza A viruses. Among these candidates, 70 miRNAs were subtypes specifically targeting each subtype of influenza A virus including 21 miRNAs targeted subtype H1N1, 27 miRNAs targeted subtype H5N1 and 22 miRNAs targeted subtype H3N2. The remaining 6 miRNAs target on multiple subtypes of influenza A viruses. Uniquely, hsa-miR-3145 is the only one candidate miRNA targeting PB1 gene of all three subtypes. Obviously, most of the candidate miRNAs are targeting on polymerase complex genes (PB2, PB1 and PA) of influenza A viruses. This study predicted potential human miRNAs targeting on different subtypes of influenza A viruses which might be useful for inhibition of viral replication and for better understanding of the interaction between virus and host cell.
Abstract: Cosmic showers, during the transit through space, produce
sub - products as a result of interactions with the intergalactic
or interstellar medium which after entering earth generate secondary
particles called Extensive Air Shower (EAS). Detection and analysis
of High Energy Particle Showers involve a plethora of theoretical and
experimental works with a host of constraints resulting in inaccuracies
in measurements. Therefore, there exist a necessity to develop a
readily available system based on soft-computational approaches
which can be used for EAS analysis. This is due to the fact that soft
computational tools such as Artificial Neural Network (ANN)s can be
trained as classifiers to adapt and learn the surrounding variations. But
single classifiers fail to reach optimality of decision making in many
situations for which Multiple Classifier System (MCS) are preferred
to enhance the ability of the system to make decisions adjusting
to finer variations. This work describes the formation of an MCS
using Multi Layer Perceptron (MLP), Recurrent Neural Network
(RNN) and Probabilistic Neural Network (PNN) with data inputs
from correlation mapping Self Organizing Map (SOM) blocks and
the output optimized by another SOM. The results show that the setup
can be adopted for real time practical applications for prediction
of primary energy and location of EAS from density values captured
using detectors in a circular grid.
Abstract: Wireless Sensor networks have a wide spectrum of civil and military applications that call for secure communication such as the terrorist tracking, target surveillance in hostile environments. For the secure communication in these application areas, we propose a method for generating a hierarchical key structure for the efficient group key management. In this paper, we apply A* algorithm in generating a hierarchical key structure by considering the history data of the ratio of addition and eviction of sensor nodes in a location where sensor nodes are deployed. Thus generated key tree structure provides an efficient way of managing the group key in terms of energy consumption when addition and eviction event occurs. A* algorithm tries to minimize the number of messages needed for group key management by the history data. The experimentation with the tree shows efficiency of the proposed method.
Abstract: The purpose is to study the model and characteristic of
participation of the suitable community to lead to develop permanent
water marketing in Bang Noi Floating Market, Bangkonti District,
Samutsongkhram Province. A total of 342 survey questionnaire was
administered to potential respondents. The researchers interviewed
the leader of the community. Appreciation Influence Control (AIC)
was used to talk with 20 villagers on arena. The findings revealed
that overall, most people had the middle level of the participation in
developing the durable Bang Noi Floating Market, Bangkonti,
Samutsongkhram Province and in aspects of gaining benefits from
developing it with atmosphere and a beautiful view for tourism. For
example, the landscape is beautiful with public utilities. The
participation in preserving and developing Bang Noi Floating Market
remains in the former way of life. The basic factor of person affects
to the participation of people such as age, level of education, career,
and income per month. Most participants are the original hosts that
have houses and shops located in the marketing and neighbor. These
people involve with the benefits and have the power to make a water
marketing strategy, the major role to set the information database. It
also found that the leader and the villagers play the important role in
setting a five-physical database. Data include level of information
such as position of village, territory of village, road, river, and
premises. Information of culture consists of a two-level of
information, interesting point, and Itinerary. The information occurs
from presenting and practicing by the leader and villagers in the
community.All of phases are presented for listening and investigating
database together in both the leader and villagers in the process of
participation.
Abstract: Delay-Tolerant Networks (DTNs) are sparse, wireless
networks where disconnections are common due to host mobility and
low node density. The Message Ferrying (MF) scheme is a mobilityassisted
paradigm to improve connectivity in DTN-like networks. A
ferry or message ferry is a special node in the network which has
a per-determined route in the deployed area and relays messages
between mobile hosts (MHs) which are intermittently connected.
Increased contact opportunities among mobile hosts and the ferry
improve the performance of the network, both in terms of message
delivery ratio and average end-end delay. However, due to the inherent
mobility of mobile hosts and pre-determined periodicity of the
message ferry, mobile hosts may often -miss- contact opportunities
with a ferry. In this paper, we propose the combination of stationary
ferry access points (FAPs) with MF routing to increase contact
opportunities between mobile hosts and the MF and consequently
improve the performance of the DTN. We also propose several
placement models for deploying FAPs on MF routes. We evaluate the
performance of the FAP placement models through comprehensive
simulation. Our findings show that FAPs do improve the performance
of MF-assisted DTNs and symmetric placement of FAPs outperforms
other placement strategies.
Abstract: Competitive relationships among Bradyrhizobium
japonicum USDA serogroup 123, 122 and 138 were screened versus
the standard commercial soybean variety Williams and two
introductions P1 377578 "671" in a field trial. Displacement of strain
123 by an effective strain should improved N2 fixation. Root nodules
were collected and strain occupancy percentage was determined
using strain specific fluorescent antibodies technique. As anticipated
the strain USDA 123 dominated 92% of nodules due to the high
affinity between the host and the symbiont. This dominance was
consistent and not changed materially either by inoculation practice
or by introducing new strainan. The interrelationship between the
genotype Williams and serogroup 122 & 138 was found very weak
although the cell density of the strain in the rhizosphere area was
equal. On the other hand, the nodule occupancy of genotypes 671 and
166 with rhizobia serogroup 123 was almost diminished to zero. .
The data further exhibited that the genotypes P1 671 and P1 166 have
high affinity to colonize with strains 122 and 138 whereas Williams
was highly promiscuous to strain 123.
Abstract: In this paper, a novel feature-based image
watermarking scheme is proposed. Zernike moments which have
invariance properties are adopted in the scheme. In the proposed
scheme, feature points are first extracted from host image and several
circular patches centered on these points are generated. The patches
are used as carriers of watermark information because they can be
regenerated to locate watermark embedding positions even when
watermarked images are severely distorted. Zernike transform is then
applied to the patches to calculate local Zernike moments. Dither
modulation is adopted to quantize the magnitudes of the Zernike
moments followed by false alarm analysis. Experimental results show
that quality degradation of watermarked image is visually
transparent. The proposed scheme is very robust against image
processing operations and geometric attacks.
Abstract: Infrastructure investments are important in developing
countries, it will not only help to foster the economic growth of a
nation, but it will also act as a platform in which new forms of
partnership and collaboration can be developed mainly in East Asian
countries. Since the last two decades, many infrastructure projects
had been completed through build-operate-transfer (BOT) type of
procurement. The developments of BOT have attracted participation
of local and foreign private sector investor to secure funding and to
deliver projects on time, within the budget and to the required
specifications. Private sectors are preferred by the government in
East Asia to participate in BOT projects due to lack of public
funding. The finding has resulted that the private sector or promoter
of the BOT projects is exposed to multiple risks which have been
discussed in this paper. Effective risk management methods and
good managerial skills are required in ensuring the success of the
project. The review indicated that mitigation measures should be
employed by the promoter throughout the concession period and
support from the host government is also required in ensuring the
success of the BOT project.
Abstract: Pabdeh shaly formation (Paleocene-Oligomiocene)
has been expanded in Fars, Khozestan and Lorestan. The lower
lithostratigraphic limit of this formation in Shiraz area is
distinguished from Gurpi formation by purple shale. Its upper limit is
gradational and conformable with Asmari formation. In order to
study sequence stratigraphy and microfacies of Pabdeh formation in
Shiraz area, one stratigraphic section have been chosen (Zanjiran
section). Petrographic studies resulted in the identification of 9
pelagic and calciturbidite microfacies. The calciturbidite microfacies
have been formed when the sea level was high, the rate of carbonate
deposition was high and it slumped into the deep marine. Sequence
stratigraphy studies show that Pabdeh formation in the studied zone
consists of two depositional sequences (DS) that the lower contact is
erosional (purple shale - type one, SBI or type two, SB2) and the
upper contact is correlative conformity (type two, SB2).
Abstract: Digital watermarking has become an important technique for copyright protection but its robustness against attacks remains a major problem. In this paper, we propose a normalizationbased robust image watermarking scheme. In the proposed scheme, original host image is first normalized to a standard form. Zernike transform is then applied to the normalized image to calculate Zernike moments. Dither modulation is adopted to quantize the magnitudes of Zernike moments according to the watermark bit stream. The watermark extracting method is a blind method. Security analysis and false alarm analysis are then performed. The quality degradation of watermarked image caused by the embedded watermark is visually transparent. Experimental results show that the proposed scheme has very high robustness against various image processing operations and geometric attacks.
Abstract: Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employed for
protecting computers and networks from malicious network-based or
host-based attacks by using traditional statistical methods to new data
mining approaches in last decades. However, today's commercially
available intrusion detection systems are signature-based that are not
capable of detecting unknown attacks. In this paper, we present a
new learning algorithm for anomaly based network intrusion
detection system using decision tree algorithm that distinguishes
attacks from normal behaviors and identifies different types of
intrusions. Experimental results on the KDD99 benchmark network
intrusion detection dataset demonstrate that the proposed learning
algorithm achieved 98% detection rate (DR) in comparison with
other existing methods.
Abstract: Intrusion Detection Systems are increasingly a key
part of systems defense. Various approaches to Intrusion Detection
are currently being used, but they are relatively ineffective. Artificial
Intelligence plays a driving role in security services. This paper
proposes a dynamic model Intelligent Intrusion Detection System,
based on specific AI approach for intrusion detection. The
techniques that are being investigated includes neural networks and
fuzzy logic with network profiling, that uses simple data mining
techniques to process the network data. The proposed system is a
hybrid system that combines anomaly, misuse and host based
detection. Simple Fuzzy rules allow us to construct if-then rules that
reflect common ways of describing security attacks. For host based
intrusion detection we use neural-networks along with self
organizing maps. Suspicious intrusions can be traced back to its
original source path and any traffic from that particular source will
be redirected back to them in future. Both network traffic and system
audit data are used as inputs for both.
Abstract: In the present study, Convective heat transfer
coefficient and pressure drop of Al2O3/water nanofluid in laminar
flow regime under constant heat flux conditions inside a circular tube
were experimentally investigated. Al2O3/water nanofluid with 0.5%
and 1% volume concentrations with 15 nm diameter nanoparticles
were used as working fluid. The effect of different volume
concentrations on convective heat transfer coefficient and friction
factor was studied. The results emphasize that increasing of particle
volume concentration leads to enhance convective heat transfer
coefficient. Measurements show the average heat transfer coefficient
enhanced about 11-20% with 0.5% volume concentration and
increased about 16-27% with 1% volume concentration compared to
distilled water. In addition, the convective heat transfer coefficient of
nanofluid enhances with increase in heat flux. From the results, the
average ratio of (fnf/fbf) was about 1.10 for 0.5% volume
concentration. Therefore, there is no significant increase in friction
factor for nanofluids.
Abstract: Network layer multicast, i.e. IP multicast, even after
many years of research, development and standardization, is not
deployed in large scale due to both technical (e.g. upgrading of
routers) and political (e.g. policy making and negotiation) issues.
Researchers looked for alternatives and proposed application/overlay
multicast where multicast functions are handled by end hosts, not
network layer routers. Member hosts wishing to receive multicast
data form a multicast delivery tree. The intermediate hosts in the tree
act as routers also, i.e. they forward data to the lower hosts in the
tree. Unlike IP multicast, where a router cannot leave the tree until all
members below it leave, in overlay multicast any member can leave
the tree at any time thus disjoining the tree and disrupting the data
dissemination. All the disrupted hosts have to rejoin the tree. This
characteristic of the overlay multicast causes multicast tree unstable,
data loss and rejoin overhead. In this paper, we propose that each node
sets its leaving time from the tree and sends join request to a number
of nodes in the tree. The nodes in the tree will reject the request if
their leaving time is earlier than the requesting node otherwise they
will accept the request. The node can join at one of the accepting
nodes. This makes the tree more stable as the nodes will join the tree
according to their leaving time, earliest leaving time node being at the
leaf of the tree. Some intermediate nodes may not follow their leaving
time and leave earlier than their leaving time thus disrupting the tree.
For this, we propose a proactive recovery mechanism so that disrupted
nodes can rejoin the tree at predetermined nodes immediately. We
have shown by simulation that there is less overhead when joining
the multicast tree and the recovery time of the disrupted nodes is
much less than the previous works. Keywords
Abstract: Decrease in hardware costs and advances in computer
networking technologies have led to increased interest in the use of
large-scale parallel and distributed computing systems. One of the
biggest issues in such systems is the development of effective
techniques/algorithms for the distribution of the processes/load of a
parallel program on multiple hosts to achieve goal(s) such as
minimizing execution time, minimizing communication delays,
maximizing resource utilization and maximizing throughput.
Substantive research using queuing analysis and assuming job
arrivals following a Poisson pattern, have shown that in a multi-host
system the probability of one of the hosts being idle while other host
has multiple jobs queued up can be very high. Such imbalances in
system load suggest that performance can be improved by either
transferring jobs from the currently heavily loaded hosts to the lightly
loaded ones or distributing load evenly/fairly among the hosts .The
algorithms known as load balancing algorithms, helps to achieve the
above said goal(s). These algorithms come into two basic categories -
static and dynamic. Whereas static load balancing algorithms (SLB)
take decisions regarding assignment of tasks to processors based on
the average estimated values of process execution times and
communication delays at compile time, Dynamic load balancing
algorithms (DLB) are adaptive to changing situations and take
decisions at run time.
The objective of this paper work is to identify qualitative
parameters for the comparison of above said algorithms. In future this
work can be extended to develop an experimental environment to
study these Load balancing algorithms based on comparative
parameters quantitatively.
Abstract: Over the past decade, mobile has experienced a
revolution that will ultimately change the way we communicate.All
these technologies have a common denominator exploitation of
computer information systems, but their operation can be tedious
because of problems with heterogeneous data sources.To overcome
the problems of heterogeneous data sources, we propose to use a
technique of adding an extra layer interfacing applications of
management or supervision at the different data sources.This layer
will be materialized by the implementation of a mediator between
different host applications and information systems frequently used
hierarchical and relational manner such that the heterogeneity is
completely transparent to the VoIP platform.
Abstract: This paper presents a new spread-spectrum
watermarking algorithm for digital images in discrete wavelet
transform (DWT) domain. The algorithm is applied for embedding
watermarks like patient identification /source identification or
doctors signature in binary image format into host digital
radiological image for potential telemedicine applications.
Performance of the algorithm is analysed by varying the gain factor,
subband decomposition levels, and size of watermark. Simulation
results show that the proposed method achieves higher watermarking
capacity.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.