Abstract: Modular multiplication is the basic operation
in most public key cryptosystems, such as RSA, DSA, ECC,
and DH key exchange. Unfortunately, very large operands
(in order of 1024 or 2048 bits) must be used to provide
sufficient security strength. The use of such big numbers
dramatically slows down the whole cipher system, especially
when running on embedded processors.
So far, customized hardware accelerators - developed on
FPGAs or ASICs - were the best choice for accelerating
modular multiplication in embedded environments. On the
other hand, many algorithms have been developed to speed
up such operations. Examples are the Montgomery modular
multiplication and the interleaved modular multiplication
algorithms. Combining both customized hardware with
an efficient algorithm is expected to provide a much faster
cipher system.
This paper introduces an enhanced architecture for computing
the modular multiplication of two large numbers X
and Y modulo a given modulus M. The proposed design is
compared with three previous architectures depending on
carry save adders and look up tables. Look up tables should
be loaded with a set of pre-computed values. Our proposed
architecture uses the same carry save addition, but replaces
both look up tables and pre-computations with an enhanced
version of sign detection techniques. The proposed architecture
supports higher frequencies than other architectures.
It also has a better overall absolute time for a single operation.
Abstract: Climate change leading to global warming affects the
earth through many different ways such as weather (temperature, precipitation, humidity and the other parameters of weather), snow coverage and ice melting, sea level rise, hydrological cycles, quality of water, agriculture, forests, ecosystems and health. One of the most
affected areas by climate change is hydrology and water resources.
Regions where majority of runoff consists of snow melt are more
sensitive to climate change. The first step of climate change studies
is to establish trends of significant climate variables including precipitation,
temperature and flow data to detect any potential climate
change impacts already happened. Two popular non-parametric trend
analysis methods, Mann-Kendal and Spearman-s Rho were applied
to Upper Euphrates Basin (Turkey) to detect trends of precipitation,
temperatures (maximum, minimum and average) and streamflow.
Abstract: Climate change is a phenomenon has been based on
the available evidence from a very long time ago and now its
existence is very probable. The speed and nature of climate
parameters changes at the middle of twentieth century has been
different and its quickness more than the before and its trend changed
to some extent comparing to the past. Climate change issue now
regarded as not only one of the most common scientific topic but also
a social political one, is not a new issue. Climate change is a
complicated atmospheric oceanic phenomenon on a global scale and
long-term. Precipitation pattern change, fast decrease of snowcovered
resources and its rapid melting, increased evaporation, the
occurrence of destroying floods, water shortage crisis, severe
reduction at the rate of harvesting agricultural products and, so on are
all the significant of climate change. To cope with this phenomenon,
its consequences and events in which public instruction is the most
important but it may be climate that no significant cant and effective
action has been done so far. The present article is included a part of
one surrey about climate change in Fars. The study area having
annually mean temperature 14 and precipitation 320 mm .23 stations
inside the basin with a common 37 year statistical period have been
applied to the meteorology data (1974-2010). Man-kendal and
change factor methods are two statistical methods, applying them, the
trend of changes and the annual mean average temperature and the
annual minimum mean temperature were studied by using them.
Based on time series for each parameter, the annual mean average
temperature and the mean of annual maximum temperature have a
rising trend so that this trend is clearer to the mean of annual
maximum temperature.
Abstract: Knowledge is indispensable but voluminous knowledge becomes a bottleneck for efficient processing. A great challenge for data mining activity is the generation of large number of potential rules as a result of mining process. In fact sometimes result size is comparable to the original data. Traditional data mining pruning activities such as support do not sufficiently reduce the huge rule space. Moreover, many practical applications are characterized by continual change of data and knowledge, thereby making knowledge voluminous with each change. The most predominant representation of the discovered knowledge is the standard Production Rules (PRs) in the form If P Then D. Michalski & Winston proposed Censored Production Rules (CPRs), as an extension of production rules, that exhibit variable precision and supports an efficient mechanism for handling exceptions. A CPR is an augmented production rule of the form: If P Then D Unless C, where C (Censor) is an exception to the rule. Such rules are employed in situations in which the conditional statement 'If P Then D' holds frequently and the assertion C holds rarely. By using a rule of this type we are free to ignore the exception conditions, when the resources needed to establish its presence, are tight or there is simply no information available as to whether it holds or not. Thus the 'If P Then D' part of the CPR expresses important information while the Unless C part acts only as a switch changes the polarity of D to ~D. In this paper a scheme based on Dempster-Shafer Theory (DST) interpretation of a CPR is suggested for discovering CPRs from the discovered flat PRs. The discovery of CPRs from flat rules would result in considerable reduction of the already discovered rules. The proposed scheme incrementally incorporates new knowledge and also reduces the size of knowledge base considerably with each episode. Examples are given to demonstrate the behaviour of the proposed scheme. The suggested cumulative learning scheme would be useful in mining data streams.
Abstract: It has been always observed that the effectiveness of
MIS as a support tool for management decisions degenerate after
time of implementation, despite the substantial investments being
made. This is true for organizations at the initial stages of MIS
implementations, manual or computerized. A survey of a sample of
middle to top managers in business and government institutions was
made. A large ratio indicates that the MIS has lost its impact on the
day-to-day operations, and even the response lag time expands
sometimes indefinitely. The data indicates an infant mortality
phenomenon of the bathtub model. Reasons may be monotonous
nature of MIS delivery, irrelevance, irreverence, timeliness, and lack
of adequate detail. All those reasons collaborate to create a degree of
degeneracy. We investigate and model as a bathtub model the
phenomenon of MIS degeneracy that inflicts the MIS systems and
renders it ineffective. A degeneracy index is developed to identify
the status of the MIS system and possible remedies to prevent the
onset of total collapse of the system to the point of being useless.
Abstract: A study was conducted to determine the effect of
feeding glycerol on dairy cows performance. Twenty four Holstein
Friesian crossbred (>87.5% Holstein Friesian) lactating dairy cows in
early lactation; averaging 13+2.4 kg of milk, 64+45 days in milk,
55+16 months old and 325+26 kg live weight, were stratified for
milk yield, days in milk, age, stage of lactation and body weight, and
then randomly allocated to three treatment groups. All cows were fed
approximate 8 kg of concentrate together with ad libitum corn silage
and freely access to clean water. Nil or 150 and 300g of glycerol
were supplemented to the cows according to treatment groups. All
cows consumed similar concentrate, corn silage and total DM and
NELP. There were no significant differences in DM intake, CP intake,
NELP intake, milk and milk composition yields. All cows had similar
fat, protein, lactose, solid not fat and total solid percentage. All cows
gain similar live weight. The present study indicated that,
supplementation of glycerol did not enhance milk yield, milk
composition and live weight change.
Abstract: The aim of the article is extending and developing
econometrics and network structure based methods which are able to
distinguish price manipulation in Tehran stock exchange. The
principal goal of the present study is to offer model for
approximating price manipulation in Tehran stock exchange. In order
to do so by applying separation method a sample consisting of 397
companies accepted at Tehran stock exchange were selected and
information related to their price and volume of trades during years
2001 until 2009 were collected and then through performing runs
test, skewness test and duration correlative test the selected
companies were divided into 2 sets of manipulated and non
manipulated companies. In the next stage by investigating
cumulative return process and volume of trades in manipulated
companies, the date of starting price manipulation was specified and
in this way the logit model, artificial neural network, multiple
discriminant analysis and by using information related to size of
company, clarity of information, ratio of P/E and liquidity of stock
one year prior price manipulation; a model for forecasting price
manipulation of stocks of companies present in Tehran stock
exchange were designed. At the end the power of forecasting models
were studied by using data of test set. Whereas the power of
forecasting logit model for test set was 92.1%, for artificial neural
network was 94.1% and multi audit analysis model was 90.2%;
therefore all of the 3 aforesaid models has high power to forecast
price manipulation and there is no considerable difference among
forecasting power of these 3 models.
Abstract: A study was undertaken to assess the potential of an
Algal Turf Scrubber to remove nitrogen from aquaculture effluent to
reduce environmental pollution. High total ammonia nitrogen
concentrations were introduced to an Algal Turf Scrubber developed
under varying hydraulic surface loading rates of African catfish
(Clarius gariepinus) effluent in a recirculating aquaculture system.
Nutrient removal rates were not affected at total suspended solids
concentration of up to 0.04g TSS/l (P > 0.05). Nitrogen removal
rates 0.93-0.99g TAN/m²/d were recorded at very high loading rates
3.76-3.81 g TAN/m²/d. Total ammonia removal showed ½ order
kinetics between 1.6 to 2.3mg/l Total Ammonia Nitrogen
concentrations. Nitrogen removal increased with its loading, which
increased with hydraulic surface loading rate. Total Ammonia
Nitrogen removal by Algal turf scrubber was higher than reported
values for fluidized bed filters and trickling filters. The algal turf
scrubber also effectively removed nitrate thereby reducing the need
for water exchange.
Abstract: This paper argues that networks, such as the ECN and the American network, are affected by certain small events which are inherent to path dependence and preclude the full evolution towards efficiency. It is advocated that the American network is superior to the ECN in many respects due to its greater flexibility and longer history. This stems in particular from the creation of the American network, which was based on a small number of cases. Such a structure encourages further changes and modifications which are not necessarily radical. The ECN, by contrast, was established by legislative action, which explains its rigid structure and resistance to change. This paper is an attempt to transpose the superiority of the American network on to the ECN. It looks at concepts such as judicial cooperation, harmonisation of procedure, peer review and regulatory impact assessments (RIAs), and dispute resolution procedures.
Abstract: Topics Disaster and Emergency Management are highly debated among experts. Fast communication will help to deal with emergencies. Problem is with the network connection and data exchange. The paper suggests a solution, which allows possibilities and perspectives of new flexible communication platform to the protection of communication systems for crisis management. This platform is used for everyday communication and communication in crisis situations too.
Abstract: Using mobile Internet access technologies and eservices,
various economic agents can efficiently offer their products
or services to a large number of clients. With the support of mobile
communications networks, the clients can have access to e-services,
anywhere and anytime. This is a base to establish a convergence of
technological and financial interests of mobile operators, software
developers, mobile terminals producers and e-content providers. In
this paper, a client server system is presented, using 3G, EDGE,
mobile terminals, for Stock Exchange e-services access.
Abstract: In this paper, Tobephobia (TBP) alludes to the fear of
failure experienced by teachers to manage curriculum change. TBP is
an emerging concept and it extends the boundaries of research in
terms of how we view achievement and failure in education.
Outcomes-based education (OBE) was introduced fifteen years ago
in South African schools without simultaneously upgrading teachers-
professional competencies. This exploratory research, therefore
examines a simple question: What is the impact of TBP and OBE on
teachers? Teacher ineptitude to cope with the OBE curriculum in the
classroom is a serious problem affecting large numbers of South
African teachers. This exploratory study sought to determine the
perceived negative impact of OBE and TBP on teachers. A survey
was conducted amongst 311 teachers in Port Elizabeth and Durban,
South Africa. The results confirm the very negative impact of TBP
and OBE on teachers. This exploratory study authenticates the
existence of TBP.
Abstract: Centrally controlled authentication and authorization services can provide enterprise with an increase in security, more flexible access control solutions and an increased users' trust. By using redirections, users of all Web-based applications within an organization are authenticated at a single well known and secure Web site and using secure communication protocol. Users are first authenticated at the central server using their domain wide credentials before being redirected to a particular Web-based application. The central authentication server will then provide others with pertinence authorization related particulars and credentials of the authenticated user to the specific application. The trust between the clients and the server hosts is established by secure session keys exchange. Case- studies are provided to demonstrate the usefulness and flexibility of the proposed solution.