Abstract: Nowadays, we are facing with network threats that
cause enormous damage to the Internet community day by day. In
this situation, more and more people try to prevent their network
security using some traditional mechanisms including firewall,
Intrusion Detection System, etc. Among them honeypot is a versatile
tool for a security practitioner, of course, they are tools that are meant
to be attacked or interacted with to more information about attackers,
their motives and tools. In this paper, we will describe usefulness of
low-interaction honeypot and high-interaction honeypot and
comparison between them. And then we propose hybrid honeypot
architecture that combines low and high -interaction honeypot to
mitigate the drawback. In this architecture, low-interaction honeypot
is used as a traffic filter. Activities like port scanning can be
effectively detected by low-interaction honeypot and stop there.
Traffic that cannot be handled by low-interaction honeypot is handed
over to high-interaction honeypot. In this case, low-interaction
honeypot is used as proxy whereas high-interaction honeypot offers
the optimal level realism. To prevent the high-interaction honeypot
from infections, containment environment (VMware) is used.
Abstract: The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital-electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent levels of trust and security served in conventional paper-based payment transactions. The paper addresses the challenge of the first trade problem in e-commerce, provides a brief literature review on electronic payment and attempts to explain the underlying concept and method of trust in relevance to electronic payment.
Abstract: Numerous experimental tests for post-installed anchor systems drilled in hardened concrete were conducted in order to estimate pull-out and shear strength accounting for uncertainties such as torque ratios, embedment depths and different diameters in demands. In this study, the strength of the systems was significantly changed by the effect of those three uncertainties during pull-out experimental tests, whereas the shear strength of the systems was not affected by torque ratios. It was also shown that concrete cone failure or damage mechanism was generally investigated during and after pull-out tests and in shear strength tests, mostly the anchor systems were failed prior to failure of primary structural system. Furthermore, 3D finite element model for the anchor systems was created by ABAQUS for the numerical analysis. The verification of finite element model was identical till the failure points to the load-displacement relationship specified by the experimental tests.
Abstract: Segmentation in ultrasound images is challenging due to the interference from speckle noise and fuzziness of boundaries. In this paper, a segmentation scheme using fuzzy c-means (FCM) clustering incorporating both intensity and texture information of images is proposed to extract breast lesions in ultrasound images. Firstly, the nonlinear structure tensor, which can facilitate to refine the edges detected by intensity, is used to extract speckle texture. And then, a spatial FCM clustering is applied on the image feature space for segmentation. In the experiments with simulated and clinical ultrasound images, the spatial FCM clustering with both intensity and texture information gets more accurate results than the conventional FCM or spatial FCM without texture information.
Abstract: Motivated by Microsoft Co. Academic Program
initiative, the department of Information Technology in King Saud
University has adopted Microsoft products in three courses. The
initiative aimed at enhancing the abilities of the university graduates
and equipping them with skills that would help them in the job
market. A number of methods of collecting assessment data were
used to evaluate the course adoption initiative. Assessment data
indicated that the goal of the course adoption is being achieved and
that the students were much better prepared to design applications
and administrate networks.
Abstract: Traditional wind tunnel models are meticulously machined from metal in a process that can take several months. While very precise, the manufacturing process is too slow to assess a new design's feasibility quickly. Rapid prototyping technology makes this concurrent study of air vehicle concepts via computer simulation and in the wind tunnel possible. This paper described the Affects layer thickness models product with rapid prototyping on Aerodynamic Coefficients for Constructed wind tunnel testing models. Three models were evaluated. The first model was a 0.05mm layer thickness and Horizontal plane 0.1μm (Ra) second model was a 0.125mm layer thickness and Horizontal plane 0.22μm (Ra) third model was a 0.15mm layer thickness and Horizontal plane 4.6μm (Ra). These models were fabricated from somos 18420 by a stereolithography (SLA). A wing-body-tail configuration was chosen for the actual study. Testing covered the Mach range of Mach 0.3 to Mach 0.9 at an angle-of-attack range of -2° to +12° at zero sideslip. Coefficients of normal force, axial force, pitching moment, and lift over drag are shown at each of these Mach numbers. Results from this study show that layer thickness does have an effect on the aerodynamic characteristics in general; the data differ between the three models by fewer than 5%. The layer thickness does have more effect on the aerodynamic characteristics when Mach number is decreased and had most effect on the aerodynamic characteristics of axial force and its derivative coefficients.
Abstract: The simulation of extrusion process is studied widely
in order to both increase products and improve quality, with broad
application in wire coating. The annular tube-tooling extrusion was
set up by a model that is termed as Navier-Stokes equation in
addition to a rheological model of differential form based on singlemode
exponential Phan-Thien/Tanner constitutive equation in a twodimensional
cylindrical coordinate system for predicting the
contraction point of the polymer melt beyond the die. Numerical
solutions are sought through semi-implicit Taylor-Galerkin pressurecorrection
finite element scheme. The investigation was focused on
incompressible creeping flow with long relaxation time in terms of
Weissenberg numbers up to 200. The isothermal case was considered
with surface tension effect on free surface in extrudate flow and no
slip at die wall. The Stream Line Upwind Petrov-Galerkin has been
proposed to stabilize solution. The structure of mesh after die exit
was adjusted following prediction of both top and bottom free
surfaces so as to keep the location of contraction point around one
unit length which is close to experimental results. The simulation of
extrusion process is studied widely in order to both increase products
and improve quality, with broad application in wire coating. The
annular tube-tooling extrusion was set up by a model that is termed
as Navier-Stokes equation in addition to a rheological model of
differential form based on single-mode exponential Phan-
Thien/Tanner constitutive equation in a two-dimensional cylindrical
coordinate system for predicting the contraction point of the polymer
melt beyond the die. Numerical solutions are sought through semiimplicit
Taylor-Galerkin pressure-correction finite element scheme.
The investigation was focused on incompressible creeping flow with
long relaxation time in terms of Weissenberg numbers up to 200. The
isothermal case was considered with surface tension effect on free
surface in extrudate flow and no slip at die wall. The Stream Line
Upwind Petrov-Galerkin has been proposed to stabilize solution. The
structure of mesh after die exit was adjusted following prediction of
both top and bottom free surfaces so as to keep the location of
contraction point around one unit length which is close to
experimental results.
Abstract: This paper studies the optimum design for reducing
optical loss of an 8x8 mechanical type optical switch due to the
temperature change. The 8x8 optical switch is composed of a base, 8
input fibers, 8 output fibers, 3 fixed mirrors and 17 movable mirrors.
First, an innovative switch configuration is proposed with
thermal-compensated design. Most mechanical type optical switches
have a disadvantage that their precision and accuracy are influenced
by the ambient temperature. Therefore, the thermal-compensated
design is to deal with this situation by using materials with different
thermal expansion coefficients (α). Second, a parametric modeling
program is developed to generate solid models for finite element
analysis, and the thermal and structural behaviors of the switch are
analyzed. Finally, an integrated optimum design program, combining
Autodesk Inventor Professional software, finite element analysis
software, and genetic algorithms, is developed for improving the
thermal behaviors that the optical loss of the switch is reduced. By
changing design parameters of the switch in the integrated design
program, the final optimum design that satisfies the design constraints
and specifications can be found.
Abstract: The seemingly ambiguous title of this paper – use of the terms maturity and innovation in concord – signifies the imperative of every organisation within the competitive domain. Where organisational maturity and innovativeness were traditionally considered antonymous, the assimilation of these two seemingly contradictory notions is fundamental to the assurance of long-term organisational prosperity. Organisations are required, now more than ever, to grow and mature their innovation capability – rending consistent innovative outputs. This paper describes research conducted to consolidate the principles of innovation and identify the fundamental components that constitute organisational innovation capability. The process of developing an Innovation Capability Maturity Model is presented. A brief description is provided of the basic components of the model, followed by a description of the case studies that were conducted to evaluate the model. The paper concludes with a summary of the findings and potential future research.
Abstract: Globalization, supported by information and
communication technologies, changes the rules of competitiveness
and increases the significance of information, knowledge and
network cooperation. In line with this trend, the need for efficient
trust-building tools has emerged. The absence of trust building
mechanisms and strategies was identified within several studies.
Through trust development, participation on e-business network and
usage of network services will increase and provide to SMEs new
economic benefits. This work is focused on effective trust building
strategies development for electronic business network platforms.
Based on trust building mechanism identification, the questionnairebased
analysis of its significance and minimum level of requirements
was conducted. In the paper, we are confirming the trust dependency
on e-Skills which play crucial role in higher level of trust into the
more sophisticated and complex trust building ICT solutions.
Abstract: This paper presents a vertical silicon nanowire n- MOSFET integrated with a CMOS-compatible fully-silicided (FUSI) NiSi2 gate. Devices with nanowire diameter of 50nm show good electrical performance (SS < 70mV/dec, DIBL < 30mV/V, Ion/Ioff > 107). Most significantly, threshold voltage tunability of about 0.2V is shown. Although threshold voltage remains low for the 50nm diameter device, it is expected to become more positive as nanowire diameter reduces.
Abstract: Wireless sensor networks (WSN) consists of many
sensor nodes that are placed on unattended environments such as
military sites in order to collect important information.
Implementing a secure protocol that can prevent forwarding forged
data and modifying content of aggregated data and has low delay
and overhead of communication, computing and storage is very
important. This paper presents a new protocol for concealed data
aggregation (CDA). In this protocol, the network is divided to
virtual cells, nodes within each cell produce a shared key to send
and receive of concealed data with each other. Considering to data
aggregation in each cell is locally and implementing a secure
authentication mechanism, data aggregation delay is very low and
producing false data in the network by malicious nodes is not
possible. To evaluate the performance of our proposed protocol, we
have presented computational models that show the performance
and low overhead in our protocol.
Abstract: Knowledge-based e-mail systems focus on
incorporating knowledge management approach in order to enhance
the traditional e-mail systems. In this paper, we present a knowledgebased
e-mail system called KS-Mail where people do not only send
and receive e-mail conventionally but are also able to create a sense
of knowledge flow. We introduce semantic processing on the e-mail
contents by automatically assigning categories and providing links to
semantically related e-mails. This is done to enrich the knowledge
value of each e-mail as well as to ease the organization of the e-mails
and their contents. At the application level, we have also built
components like the service manager, evaluation engine and search
engine to handle the e-mail processes efficiently by providing the
means to share and reuse knowledge. For this purpose, we present the
KS-Mail architecture, and elaborate on the details of the e-mail
server and the application server. We present the ontology mapping
technique used to achieve the e-mail content-s categorization as well
as the protocols that we have developed to handle the transactions in
the e-mail system. Finally, we discuss further on the implementation
of the modules presented in the KS-Mail architecture.
Abstract: Emerging Adulthood, the period during ages 18 to 25,
is a new conceptualitation proposed by Arnett which is especially
prevalent in the industrialized countries. Turkey is basically a
developing country having a young population structure.
Investigating the presence of such a life period in such a culture
might be helpful in understanding educational and psychological
needs of people who are in their twenties. With the aim of
investigating Emerging Adulthood in Turkey, a well-known
instrument (IDEA, 2003) was adapted to Turkish language and
Turkish culture. The scale was administered to 296 participants
between 15 and 34 ages and validity and reliability were conducted.
Exploratory factor analysis revealed three subscales. Reliability
coefficients of the scale (Cronbach a) was found as .69. Test-retest
reliability coefficients was found for the scale as .81. Finally, “The
IDEA" with 20 items was obtained to be used in the Turkish
population. The instrument is ready to be administered among
Turkish young people for the investigation of transition to adulthood,
and whether such a emerging adulthood period really existed.
Abstract: In this paper, the application of the Mode Matching
(MM) method in the case of photonic crystal waveguide
discontinuities is presented. The structure under consideration is
divided into a number of cells, which supports a number of guided
and evanescent modes. These modes can be calculated numerically
by an alternative formulation of the plane wave expansion method
for each frequency. A matrix equation is then formed relating the
modal amplitudes at the beginning and at the end of the structure.
The theory is highly efficient and accurate and can be applied to
study the transmission sensitivity of photonic crystal devices due to
fabrication tolerances. The accuracy of the MM method is compared
to the Finite Difference Frequency Domain (FDFD) and the Adjoint
Variable Method (AVM) and good agreement is observed.
Abstract: This article combines two techniques: data
envelopment analysis (DEA) and Factor analysis (FA) to data
reduction in decision making units (DMU). Data envelopment
analysis (DEA), a popular linear programming technique is useful to
rate comparatively operational efficiency of decision making units
(DMU) based on their deterministic (not necessarily stochastic)
input–output data and factor analysis techniques, have been proposed
as data reduction and classification technique, which can be applied
in data envelopment analysis (DEA) technique for reduction input –
output data. Numerical results reveal that the new approach shows a
good consistency in ranking with DEA.
Abstract: The paper discuses the effect of initial stresses on the reflection coefficients of plane waves in a dissipative medium. Basic governing equations are formulated in context of Biot's incremental deformation theory. These governing equations are solved analytically to obtain the dimensional phase velocities of plane waves propagating in plane of symmetry. Closed-form expressions for the reflection coefficients of P and SV waves- incident at the free surface of an initially stressed dissipative medium are obtained. Numerical computations, using these expressions, are carried out for a particular model. Computations made with the results predicted in presence and absence of the initial stresses and the results have been shown graphically. The study shows that the presence of compressive initial stresses increases the velocity of longitudinal wave (P-wave) but diminishes that of transverse wave (SV-wave). Also the numerical results presented indicate that initial stresses and dissipation might affect the reflection coefficients significantly.
Abstract: In this study, a three-dimensional haptotaxis model to simulate the migration of a population of cancer cells has been proposed. The invasion of cancer cells is related with the hapto-attractant and the effect of the interface energies between the cells and the ECM. The diffuse interface model, which incorporates the haptotaxis mechanism and interface energies, is employed. The semi-implicit Fourier spectral scheme is adopted for efficient evaluation of the simulation. The simulation results thoroughly reveal the dynamics of cancer-cell migration.
Abstract: This paper proposes a neural network weights and
topology optimization using genetic evolution and the
backpropagation training algorithm. The proposed crossover and
mutation operators aims to adapt the networks architectures and
weights during the evolution process. Through a specific inheritance
procedure, the weights are transmitted from the parents to their
offsprings, which allows re-exploitation of the already trained
networks and hence the acceleration of the global convergence of the
algorithm. In the preprocessing phase, a new feature extraction
method is proposed based on Legendre moments with the Maximum
entropy principle MEP as a selection criterion. This allows a global
search space reduction in the design of the networks. The proposed
method has been applied and tested on the well known MNIST
database of handwritten digits.
Abstract: Mobile ad hoc network is a collection of mobile
nodes communicating through wireless channels without any
existing network infrastructure or centralized administration.
Because of the limited transmission range of wireless network
interfaces, multiple "hops" may be needed to exchange data
across the network. Consequently, many routing algorithms
have come into existence to satisfy the needs of
communications in such networks. Researchers have
conducted many simulations comparing the performance of
these routing protocols under various conditions and
constraints. One question that arises is whether speed of nodes
affects the relative performance of routing protocols being
studied. This paper addresses the question by simulating two
routing protocols AODV and DSDV. Protocols were
simulated using the ns-2 and were compared in terms of
packet delivery fraction, normalized routing load and average
delay, while varying number of nodes, and speed.