Abstract: In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security. Security services should be guaranteed both for Mobile Agent and for Agent Server. In this paper to protect the Mobile Agent and Agent Server in an ad hoc network we have proposed a solution which is based on Threshold Cryptography, a new vibe in the cryptographic world where trust is distributed among multiple nodes in the network.
Abstract: β-Glucosidase is an important enzyme for production
of ethanol from lignocellulose. With hydrolytic activity on
cellooligosaccharides, especially cellobiose, β-glucosidase removes
product inhibitory effect on cellulases and forms fermentable sugars.
In this study, β-glucosidase encoding gene (BGL1) from traditional
starter yeast Saccharomycosis fibuligera BMQ908 was cloned and
expressed in Pichia pastoris. BGL1 of S. fibuligera BMQ 908 shared
98% nucleotide homology with the closest GenBank sequence
(M22475) but identity in amino-acid sequences of catalytic domains.
Recombinant plasmid pPICZαA/BGL1 containing the sequence
encoding BGL1 mature protein and α-factor secretion signal was
constructed and transformed into methylotrophic yeast P. pastoris by
electroporation. The recombinant strain produced single extracellular
protein with molecular weight of 120 kDa and cellobiase activity of
60 IU/ml. The optimum pH of the recombinant β-glucosidase was 5.0
and the optimum temperature was 50°C.
Abstract: A new conceptual architecture for low-level neural
pattern recognition is presented. The key ideas are that the brain
implements support vector machines and that support vectors are
represented as memory patterns in competitive queuing memories. A
binary classifier is built from two competitive queuing memories
holding positive and negative valence training examples respectively.
The support vector machine classification function is calculated in
synchronized evaluation cycles. The kernel is computed by bisymmetric
feed-forward networks feed by sensory input and by
competitive queuing memories traversing the complete sequence of
support vectors. Temporary summation generates the output
classification. It is speculated that perception apparatus in the brain
reuses structures that have evolved for enabling fluent execution of
prepared action sequences so that pattern recognition is built on
internalized motor programmes.
Abstract: This paper is introduced a modification to Diffie-
Hellman protocol to be applicable on the decimal numbers, which
they are the numbers between zero and one. For this purpose we
extend the theory of the congruence. The new congruence is over
the set of the real numbers and it is called the “real congruence"
or the “real modulus". We will refer to the existing congruence by
the “integer congruence" or the “integer modulus". This extension
will define new terms and redefine the existing terms. As the
properties and the theorems of the integer modulus are extended as
well. Modified Diffie-Hellman key exchange protocol is produced a
sharing, secure and decimal secret key for the the cryptosystems that
depend on decimal numbers.
Abstract: Decrease in hardware costs and advances in computer
networking technologies have led to increased interest in the use of
large-scale parallel and distributed computing systems. One of the
biggest issues in such systems is the development of effective
techniques/algorithms for the distribution of the processes/load of a
parallel program on multiple hosts to achieve goal(s) such as
minimizing execution time, minimizing communication delays,
maximizing resource utilization and maximizing throughput.
Substantive research using queuing analysis and assuming job
arrivals following a Poisson pattern, have shown that in a multi-host
system the probability of one of the hosts being idle while other host
has multiple jobs queued up can be very high. Such imbalances in
system load suggest that performance can be improved by either
transferring jobs from the currently heavily loaded hosts to the lightly
loaded ones or distributing load evenly/fairly among the hosts .The
algorithms known as load balancing algorithms, helps to achieve the
above said goal(s). These algorithms come into two basic categories -
static and dynamic. Whereas static load balancing algorithms (SLB)
take decisions regarding assignment of tasks to processors based on
the average estimated values of process execution times and
communication delays at compile time, Dynamic load balancing
algorithms (DLB) are adaptive to changing situations and take
decisions at run time.
The objective of this paper work is to identify qualitative
parameters for the comparison of above said algorithms. In future this
work can be extended to develop an experimental environment to
study these Load balancing algorithms based on comparative
parameters quantitatively.
Abstract: In this paper, a simple active contour based visual
tracking algorithm is presented for outdoor AGV application which is
currently under development at the USM robotic research group
(URRG) lab. The presented algorithm is computationally low cost
and able to track road boundaries in an image sequence and can
easily be implemented on available low cost hardware. The proposed
algorithm used an active shape modeling using the B-spline
deformable template and recursive curve fitting method to track the
current orientation of the road.
Abstract: The quest of providing more secure identification
system has led to a rise in developing biometric systems. Dorsal
hand vein pattern is an emerging biometric which has attracted the
attention of many researchers, of late. Different approaches have
been used to extract the vein pattern and match them. In this work,
Principle Component Analysis (PCA) which is a method that has
been successfully applied on human faces and hand geometry is
applied on the dorsal hand vein pattern. PCA has been used to obtain
eigenveins which is a low dimensional representation of vein pattern
features. Low cost CCD cameras were used to obtain the vein
images. The extraction of the vein pattern was obtained by applying
morphology. We have applied noise reduction filters to enhance the
vein patterns. The system has been successfully tested on a database
of 200 images using a threshold value of 0.9. The results obtained are
encouraging.
Abstract: Chemical detection is still a continuous challenge when
it comes to designing single-walled carbon nanotube (SWCNT)
sensors with high selectivity, especially in complex chemical
environments. A perfect example of such an environment would be in
thermally oxidized soybean oil. At elevated temperatures, oil oxidizes
through a series of chemical reactions which results in the formation of
monoacylglycerols, diacylglycerols, oxidized triacylglycerols, dimers,
trimers, polymers, free fatty acids, ketones, aldehydes, alcohols,
esters, and other minor products. In order to detect the rancidity of
oxidized soybean oil, carbon nanotube chemiresistor sensors have
been coated with polyethylenimine (PEI) to enhance the sensitivity
and selectivity. PEI functionalized SWCNTs are known to have a high
selectivity towards strong electron withdrawing molecules. The
sensors were very responsive to different oil oxidation levels and
furthermore, displayed a rapid recovery in ambient air without the
need of heating or UV exposure.
Abstract: Due to the emergence of “Humanized Healthcare"
introduced by Professor Dr. Prawase Wasi in 2003[1], the
development of this paradigm tends to be widely implemented. The
organizations included Healthcare Accreditation Institute (public
organization), National Health Foundation, Mahidol University in
cooperation with Thai Health Promotion Foundation, and National
Health Security Office (Thailand) have selected the hospitals or
infirmaries that are qualified for humanized healthcare since 2008-
2010 and 35 of them are chosen to be the outstandingly navigating
organizations for the development of humanized healthcare,
humanized healthcare award [2].
The research aims to study the current issue, characteristics and
patterns of hospital administration contributing to humanized
healthcare system in Thailand. The selected case studies are from
four hospitals including Dansai Crown Prince Hospital, Leoi;
Ubolrattana Hospital, Khon Kaen; Kapho Hospital, Pattani; and
Prathai Hospital, Nakhonrachasima. The methodology is in-depth
interviewing with 10 staffs working as hospital executive directors,
and representatives from leader groups including directors,
multidisciplinary hospital committees, personnel development
committees, physicians and nurses in each hospital. (Total=40) In
addition, focus group discussions between hospital staffs and general
people (including patients and their relatives, the community leader,
and other people) are held by means of setting 4 groups including 8
people within each group. (Total=128) The observation on the
working in each hospital is also implemented. The findings of the
study reveal that there are five important aspects found in each
hospital including (1) the quality improvement under the mental and
spiritual development policy from the chief executives and lead
teams, leaders as Role model and they have visionary leadership; (2)
the participation hospital administration system focusing on learning
process and stakeholder- needs, spiritual human resource
management and development; (3) the relationship among people
especially staffs, team work skills, mutual understanding, effective
communication and personal inner-development; (4) organization
culture relevant to the awareness of patients- rights as well as the
participation policy including spiritual growth achieving to the same
goals, sharing vision, developing public mind, and caring; and (5)
healing structures or environment providing warmth and convenience
for hospital staffs, patients and their relatives and visitors.
Abstract: Science and technology of ultrasonic is widely used in
recent years for industrial and medicinal application. The acoustical
properties of 2-mercapto substituted pyrimidines viz.,2- Mercapto-4-
(2’,4’ –dichloro phenyl) – 6-(2’ – hydroxyl -4’ –methyl-5’ –
chlorophenyl) pyrimidine and 2 –Mercapto – 4-(4’ –chloro phenyl) –
6-(2’ – hydroxyl -4’ –methyl-5’ –chlorophenyl) pyrimidine have been
investigated from the ultrasonic velocity and density measurements at
different concentration and different % in dioxane-water mixture at
305K. The adiabatic compressibility (βs), acoustic impedance (Z),
intermolecular free length (Lf), apparent molar volume(ϕv) and
relative association (RA) values have been calculated from the
experimental data of velocity and density measurement at
concentration range of 0.01- 0.000625 mol/lit and 70%,75% and 80%
dioxane water mixture. These above parameters are used to discuss
the structural and molecular interactions.
Abstract: Sorting appears the most attention among all computational tasks over the past years because sorted data is at the heart of many computations. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. Many parallel sorting algorithms have been investigated for a variety of parallel computer architectures. In this paper, three parallel sorting algorithms have been implemented and compared in terms of their overall execution time. The algorithms implemented are the odd-even transposition sort, parallel merge sort and parallel rank sort. Cluster of Workstations or Windows Compute Cluster has been used to compare the algorithms implemented. The C# programming language is used to develop the sorting algorithms. The MPI (Message Passing Interface) library has been selected to establish the communication and synchronization between processors. The time complexity for each parallel sorting algorithm will also be mentioned and analyzed.
Abstract: The main mission of Ezilla is to provide a friendly
interface to access the virtual machine and quickly deploy the high
performance computing environment. Ezilla has been developed by
Pervasive Computing Team at National Center for High-performance
Computing (NCHC). Ezilla integrates the Cloud middleware,
virtualization technology, and Web-based Operating System (WebOS)
to form a virtual computer in distributed computing environment. In
order to upgrade the dataset and speedup, we proposed the sensor
observation system to deal with a huge amount of data in the
Cassandra database. The sensor observation system is based on the
Ezilla to store sensor raw data into distributed database. We adopt the
Ezilla Cloud service to create virtual machines and login into virtual
machine to deploy the sensor observation system. Integrating the
sensor observation system with Ezilla is to quickly deploy experiment
environment and access a huge amount of data with distributed
database that support the replication mechanism to protect the data
security.
Abstract: Random Oracle Model (ROM) is an effective method
for measuring the practical security of cryptograph. In this paper, we
try to use it into information hiding system (IHS). Because IHS has its
own properties, the ROM must be modified if it is used into IHS.
Firstly, we fully discuss why and how to modify each part of ROM
respectively. The main changes include: 1) Divide the attacks that IHS
may be suffered into two phases and divide the attacks of each phase
into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3)
Define Oracle and four Black-boxes that IHS used. 4) Propose the
formalized adversary model. And 5) Give the definition of judge.
Secondly, based on ROM of IHS, the security against known original
cover attack (KOCA-KOCA-security) is defined. Then, we give an
actual information hiding scheme and prove that it is
KOCA-KOCA-secure. Finally, we conclude the paper and propose the
open problems of further research.
Abstract: Scatter behavior of fatigue life in die-cast AM60B
alloy was investigated. For comparison, those in rolled AM60B alloy
and die-cast A365-T5 aluminum alloy were also studied. Scatter
behavior of pore size was also investigated to discuss dominant
factors for fatigue life scatter in die-cast materials. Three-parameter
Weibull function was suitable to explain the scatter behavior of both
fatigue life and pore size. The scatter of fatigue life in die-cast
AM60B alloy was almost comparable to that in die-cast A365-T5
alloy, while it was significantly large compared to that in the rolled
AM60B alloy. Scatter behavior of pore size observed at fracture
nucleation site on the fracture surface was comparable to that
observed on the specimen cross-section and also to that of fatigue
life. Therefore, the dominant factor for large scatter of fatigue life in
die-cast alloys would be the large scatter of pore size. This
speculation was confirmed by the fracture mechanics fatigue life
prediction, where the pore observed at fatigue crack nucleation site
was assumed as the pre-existing crack.
Abstract: In this paper, supply policy and procurement of
shared resources in some kinds of concurrent construction projects
are investigated. This could be oriented to the problems of holding
construction companies who involve in different projects
concurrently and they have to supply limited resources to several
projects as well as prevent delays to any project. Limits on
transportation vehicles and storage facilities for potential
construction materials and also the available resources (such as cash
or manpower) are some of the examples which affect considerably on
management of all projects over all. The research includes
investigation of some real multi-storey buildings during their
execution periods and surveying the history of the activities. It is
shown that the common resource demand variation curve of the
projects may be expanded or displaced to achieve an optimum
distribution scheme. Of course, it may cause some delay to some
projects, but it has minimum influence on whole execution period of
all projects and its influence on procurement cost of the projects is
considerable. These observations on investigation of some
multistorey building which are built in Iran will be presented in this
paper.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Abstract: The dome with ribs and rings, which covers the
ROMEXPO pavilion from Bucharest, was designed after the collapse
of the single layer reticulated dome. In this paper, it was made the
checking of the structure, under the dynamic loads with three
recorded accelerograms calibrated according to Romanian seismic
design code P100-1/2006. Under the action the dynamic loadings, it
was made a time-history analysis to determine the zones where the
plastic hinges appear, at what accelerations and their position on the
structure. The studied dome is formed by 32 spatial semi arches and
three rings: one circular ring located at the top of the dome and
another two rings, design as trusses, the first near the supports and the
second as an intermediate rings above the skylights. Above the
skylights up to the top, the dome is tight together with purlins and
bracings.
Abstract: In this paper, the modelling and design of artificial neural network architecture for load forecasting purposes is investigated. The primary pre-requisite for power system planning is to arrive at realistic estimates of future demand of power, which is known as Load Forecasting. Short Term Load Forecasting (STLF) helps in determining the economic, reliable and secure operating strategies for power system. The dependence of load on several factors makes the load forecasting a very challenging job. An over estimation of the load may cause premature investment and unnecessary blocking of the capital where as under estimation of load may result in shortage of equipment and circuits. It is always better to plan the system for the load slightly higher than expected one so that no exigency may arise. In this paper, a load-forecasting model is proposed using a multilayer neural network with an appropriately modified back propagation learning algorithm. Once the neural network model is designed and trained, it can forecast the load of the power system 24 hours ahead on daily basis and can also forecast the cumulative load on daily basis. The real load data that is used for the Artificial Neural Network training was taken from LDC, Gujarat Electricity Board, Jambuva, Gujarat, India. The results show that the load forecasting of the ANN model follows the actual load pattern more accurately throughout the forecasted period.
Abstract: A geothermal power plant multiple simulator for
operators training is presented. The simulator is designed to be
installed in a wireless local area network and has a capacity to train
one to six operators simultaneously, each one with an independent
simulation session. The sessions must be supervised only by one
instructor. The main parts of this multiple simulator are: instructor
and operator-s stations. On the instructor station, the instructor
controls the simulation sessions, establishes training exercises and
supervises each power plant operator in individual way. This station
is hosted in a Main Personal Computer (NS) and its main functions
are: to set initial conditions, snapshots, malfunctions or faults,
monitoring trends, and process and soft-panel diagrams. On the other
hand the operators carry out their actions over the power plant
simulated on the operator-s stations; each one is also hosted in a PC.
The main software of instructor and operator-s stations are executed
on the same NS and displayed in PCs through graphical Interactive
Process Diagrams (IDP). The geothermal multiple simulator has been
installed in the Geothermal Simulation Training Center (GSTC) of
the Comisi├│n Federal de Electricidad, (Federal Commission of
Electricity, CFE), Mexico, and is being utilized as a part of the
training courses for geothermal power plant operators.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.