Abstract: This paper introduces a hardware solution to password
exposure problem caused by direct accesses to the keyboard hardware
interfaces through which a possible attacker is able to grab user-s
password even where existing countermeasures are deployed. Several
researches have proposed reasonable software based solutions to the
problem for years. However, recently introduced hardware
vulnerability problems have neutralized the software approaches and
yet proposed any effective software solution to the vulnerability.
Hardware approach in this paper is expected as the only solution to the
vulnerability
Abstract: Majority of Business Software Systems (BSS)
Development and Enhancement Projects (D&EP) fail to meet criteria
of their effectiveness, what leads to the considerable financial losses.
One of the fundamental reasons for such projects- exceptionally low
success rate are improperly derived estimates for their costs and time.
In the case of BSS D&EP these attributes are determined by the work
effort, meanwhile reliable and objective effort estimation still appears
to be a great challenge to the software engineering. Thus this paper is
aimed at presenting the most important synthetic conclusions coming
from the author-s own studies concerning the main factors of
effective BSS D&EP work effort estimation. Thanks to the rational
investment decisions made on the basis of reliable and objective
criteria it is possible to reduce losses caused not only by abandoned
projects but also by large scale of overrunning the time and costs of
BSS D&EP execution.
Abstract: The Elliptic Curve Digital Signature Algorithm
(ECDSA) is the elliptic curve analogue of DSA, where it is a digital
signature scheme designed to provide a digital signature based on a
secret number known only to the signer and also on the actual
message being signed. These digital signatures are considered the
digital counterparts to handwritten signatures, and are the basis for
validating the authenticity of a connection. The security of these
schemes results from the infeasibility to compute the signature
without the private key. In this paper we introduce a proposed to
development the original ECDSA with more complexity.
Abstract: The aim of this paper is to explore the security issues
that significantly affect the performance of Mobile Adhoc Networks
(MANET)and limit the services provided to their intended users. The
MANETs are more vulnerable to Distributed Denial of Service
attacks (DDoS) because of their properties like shared medium,
dynamic topologies etc. A DDoS attack is a coordinated attempt
made by malicious users to flood the victim network with the large
amount of data such that the resources of the victim network are
exhausted resulting in the deterioration of the network performance.
This paper highlights the effects of different types of DDoS attacks
in MANETs and categorizes them according to their behavior.
Abstract: This paper proposes a technique to protect against
email bombing. The technique employs a statistical approach, Naïve
Bayes (NB), and Neural Networks to show that it is possible to
differentiate between good and bad traffic to protect against email
bombing attacks. Neural networks and Naïve Bayes can be trained
by utilizing many email messages that include both input and output
data for legitimate and non-legitimate emails. The input to the model
includes the contents of the body of the messages, the subject, and
the headers. This information will be used to determine if the email
is normal or an attack email. Preliminary tests suggest that Naïve
Bayes can be trained to produce an accurate response to confirm
which email represents an attack.
Abstract: Nowadays over-consumption of fossil energy in
buildings especially in residential buildings and also considering the
increase in populations, the crisis of energy shortage in a near future
is predictable. The recent performance of developed countries in
construction with the aim of decreasing fossil energies shows that
these countries have understood the incoming crisis and has taken
reasonable and basic actions in this regard. However, Iranian
architecture, with several thousands years of history, has acquired
and executed invaluable experiences in designing, adapting and
coordinating with the nature.
Architectural studies during the recent decades show that imitating
modern western architecture results in high energy wastage beside
the fact that it not reasonably adaptable and corresponded with the
habits and customs of people unlike the architecture in the past which
was compatible and adaptable with the climatic conditions and this
necessitates optimal using of renewable energies more than ever. This
paper studies problems of design, execution and living in today's
houses and reviews the characteristics of climatic elements paying
special attention to the performance of trombe wall and solar
greenhouse in traditional houses and offers some suggestions for
combining these two elements and a climatic strategy.
Abstract: Carbon nanotubes (CNTs) are attractive because of
their excellent chemical durability mechanical strength and electrical
properties. Therefore there is interest in CNTs for not only electrical
and mechanical application, but also biological and medical
application.
In this study, the dispersion power of surfactant-treated multiwalled
carbon nanotubes (MWCNTs) and their effect on the antibacterial
activity were examined. Surfactant was used sodium
dodecyl-benzenesulfonate (SDBS). UV-vis absorbance and
transmission electron microscopy(TEM) were used to characterize the
dispersion of MWCNTs in the aqueous phase, showing that the
surfactant molecules had been adsorbed onto the MWCNTs surface.
The surfactant-treated MWCNTs exhibited antimicrobial activities
to streptococcus mutans. The optical density growth curves and viable
cell number determined by the plating method suggested that the
antimicrobial activity of surfactant-treated MWCNTs was both
concentration and treatment time-dependent.
Abstract: User interaction components of Augmented Reality (AR) systems have to be tested with users in order to find and fix usability problems as early as possible. In this paper we will report on a user-centered design approach for AR systems following the experience acquired during the design and evaluation of a software prototype for an AR-based educational platform. In this respect we will focus on the re-design of the user task based on the results from a formative usability evaluation. The basic idea of our approach is to describe task scenarios in a tabular format, to develop a task model in a task modeling environment and then to simulate the execution.
Abstract: The purpose of this study is to revisit the concept of
rape as represented by professionals in the literature as well as its
perception (beliefs and attitudes) in the population at large and to
propose methodological improvements to its measurement tool. Rape
is a serious crime threatening its victim-s physical and mental health
and integrity; and as such is legally prosecuted in all modern
societies. The problem is not in accepting or rejecting rape as a
criminal act, but rather in the vagueness of its interpretations and
“justifications" maintained in the mentality of modern societies -
known in the literature as the phenomenon of "rape-myth". The rapemyth
can be studied from different perspectives: criminology,
sociology, ethics, medicine and psychology. Its investigation requires
rigorous scientific objectivity, free of passion (victims of rape are at
risk of emotional bias), free of activism (social activists, even if wellintentioned
are also biased), free of any pre-emptive assumptions or
prejudices. To apply a rigorous scientific procedure, we need a solid,
valid and reliable measurement. Rape is a form of heterosexual or
homosexual aggression, violently forcing the victim to give-in in the
sexual activity of the aggressor against her/his will. Human beings
always try to “understand" or find a reason justifying their acts.
Psychological literature provides multiple clinical and experimental
examples of it; just to mention the famous studies by Milgram on the
level of electroshock delivered by the “teacher" towards the “learner"
if “scientifically justifiable" or the studies on the behavior of
“prisoners" and the “guards" and many other experiments and field
observations. Sigmund Freud presented the phenomenon of
unconscious justification and called it rationalization. The multiple
justifications, rationalizations and repeated opinions about sexual
behavior contribute to a myth maintained in the society. What kind of
“rationale" our societies apply to “understand" the non-consensual
sexual behavior? There are many, just to mention few:
• Sex is a ludistic activity for both participants, therefore –
even if not consented – it should bring pleasure to both.
• Everybody wants sex, but only men are allowed to manifest
it openly while women have to pretend the opposite, thus men have
to initiate sexual behavior and women would follow.
• A person who strongly needs sex is free to manifest it and
struggle to get it; the person who doesn-t want it must not reveal
her/his sexual attraction and avoid risky situations; otherwise she/he
is perceived as a promiscuous seducer.
• A person who doesn-t fight against the sexual initiator
unconsciously accepts the rape (does it explain why homosexual
rapes are reported less frequently than rapes against women?).
• Women who are raped deserve it because their wardrobe is
very revealing and seducing and they ''willingly'' go to highly risky
places (alleys, dark roads, etc.).
• Men need to ventilate their sexual energy and if they are
deprived of a partner their urge to have sex is difficult to control.
• Men are supposed to initiate and insist even by force to have
sex (their testosterone makes them both sexual and aggressive).
The paper overviews numerous cultural beliefs about masculine
versus feminine behavior and their impact on the “rape myth".
Abstract: In this study, participants with adjustment disorder with depressed mood (aged 18-54 years) with mild depression (N=18), severe depression (N=12) were compared with healthy controls (N=20) on the Multidimensional Aptitude Battery (MAB) a cognitive performance test. Using One Way Analysis of Variance and Matched Sample t-test. The results of the analysis shows that severely depressed participants performed poorly on the cognitive performance test relative to controls, however there were no significant differences on the cognitive performance test scores between the severely depressed and the mildly depressed. In addition, performance on the non-verbal performance subtest was poorer than that of the verbal subtest, suggesting that depression affects the executive functions of the person.
Abstract: The continued growth of the cities is causing an
increase of the amount of surface to illuminate. However, this rise
into lighting brings some unintended consequences such as increased
of energy consumption or the light pollution. To make these effects
less intrusive as possible some councils have chosen to perform a
part-night lighting in some areas. Nonetheless, this kind of shutdown
may cause serious problems which we intend to highlight in this
paper.
Abstract: In this paper, we propose an improved 3D star skeleton
technique, which is a suitable skeletonization for human posture representation
and reflects the 3D information of human posture.
Moreover, the proposed technique is simple and then can be performed
in real-time. The existing skeleton construction techniques, such as
distance transformation, Voronoi diagram, and thinning, focus on the
precision of skeleton information. Therefore, those techniques are not
applicable to real-time posture recognition since they are computationally
expensive and highly susceptible to noise of boundary. Although
a 2D star skeleton was proposed to complement these problems,
it also has some limitations to describe the 3D information of the
posture. To represent human posture effectively, the constructed skeleton
should consider the 3D information of posture. The proposed 3D
star skeleton contains 3D data of human, and focuses on human action
and posture recognition. Our 3D star skeleton uses the 8 projection
maps which have 2D silhouette information and depth data of human
surface. And the extremal points can be extracted as the features of 3D
star skeleton, without searching whole boundary of object. Therefore,
on execution time, our 3D star skeleton is faster than the “greedy" 3D
star skeleton using the whole boundary points on the surface. Moreover,
our method can offer more accurate skeleton of posture than the
existing star skeleton since the 3D data for the object is concerned.
Additionally, we make a codebook, a collection of representative 3D
star skeletons about 7 postures, to recognize what posture of constructed
skeleton is.
Abstract: In a recent year usage of VoIP subscription has increased tremendously as compare to Public Switching Telephone System(PSTN). A VoIP subscriber would like to know the exact tariffs of the calls made using VoIP. As the usage increases, the rate of fraud is also increases, causing users complain about excess billing. This in turn hampers the growth of VoIP .This paper describe the common frauds and attack on VoIP based system and make an attempt to solve the billing attack by creating secured channel between caller and callee.
Abstract: The voltage/current characteristics and the effect of
NO2 gas on the electrical conductivity of a PbPc gas sensor array is
investigated. The gas sensor is manufactured using vacuum
deposition of gold electrodes on sapphire substrate with the leadphathalocyanine
vacuum sublimed on the top of the gold electrodes.
Two versions of the PbPc gas sensor array are investigated. The
tested types differ in the gap sizes between the deposited gold
electrodes. The sensors are tested at different temperatures to account
for conductivity changes as the molecular adsorption/desorption rate
is affected by heat. The obtained results found to be encouraging as
the sensors shoed stability and sensitivity towards low concentration
of applied NO2 gas.
Abstract: In molecular biology, microarray technology is widely and successfully utilized to efficiently measure gene activity. If working with less studied organisms, methods to design custom-made microarray probes are available. One design criterion is to select probes with minimal melting temperature variances thus ensuring similar hybridization properties. If the microarray application focuses on the investigation of metabolic pathways, it is not necessary to cover the whole genome. It is more efficient to cover each metabolic pathway with a limited number of genes. Firstly, an approach is presented which minimizes the overall melting temperature variance of selected probes for all genes of interest. Secondly, the approach is extended to include the additional constraints of covering all pathways with a limited number of genes while minimizing the overall variance. The new optimization problem is solved by a bottom-up programming approach which reduces the complexity to make it computationally feasible. The new method is exemplary applied for the selection of microarray probes in order to cover all fungal secondary metabolite gene clusters for Aspergillus terreus.
Abstract: The scientific achievements coming from molecular
biology depend greatly on the capability of computational
applications to analyze the laboratorial results. A comprehensive
analysis of an experiment requires typically the simultaneous study
of the obtained dataset with data that is available in several distinct
public databases. Nevertheless, developing a centralized access to
these distributed databases rises up a set of challenges such as: what
is the best integration strategy, how to solve nomenclature clashes,
how to solve database overlapping data and how to deal with huge
datasets. In this paper we present GeNS, a system that uses a simple and yet innovative approach to address several biological data integration issues. Compared with existing systems, the main
advantages of GeNS are related to its maintenance simplicity and to its coverage and scalability, in terms of number of supported
databases and data types. To support our claims we present the current use of GeNS in two concrete applications. GeNS currently contains more than 140 million of biological relations and it can be
publicly downloaded or remotely access through SOAP web services.
Abstract: The phase diagrams and compositions of coexisting
phases have been determined for aqueous two-phase systems
containing poly(propylene glycol) with average molecular weight of
425 and sodium citrate at various pH of 3.93, 4.44, 4.6, 4.97, 5.1,
8.22. The effect of pH on the salting-out effect of poly (propylene
glycol) by sodium citrate has been studied. It was found that, an
increasing in pH caused the expansion of two-phase region.
Increasing pH also increases the concentration of PPG in the PPGrich
phase, while the salt-rich phase will be somewhat mole diluted.
Abstract: This paper uses quasi-steady molecular statics model
and diamond tool to carry out simulation temperature rise of nanoscale
orthogonal cutting single-crystal silicon. It further qualitatively
analyzes temperature field of silicon workpiece without considering
heat transfer and considering heat transfer. This paper supposes that
the temperature rise of workpiece is mainly caused by two heat sources:
plastic deformation heat and friction heat. Then, this paper develops a
theoretical model about production of the plastic deformation heat and
friction heat during nanoscale orthogonal cutting. After the increased
temperature produced by these two heat sources are added up, the
acquired total temperature rise at each atom of the workpiece is
substituted in heat transfer finite difference equation to carry out heat
transfer and calculates the temperature field in each step and makes
related analysis.
Abstract: Hypernetworks are a generalized graph structure
representing higher-order interactions between variables. We present a
method for self-organizing hypernetworks to learn an associative
memory of sentences and to recall the sentences from this memory.
This learning method is inspired by the “mental chemistry" model of
cognition and the “molecular self-assembly" technology in
biochemistry. Simulation experiments are performed on a corpus of
natural-language dialogues of approximately 300K sentences
collected from TV drama captions. We report on the sentence
completion performance as a function of the order of word-interaction
and the size of the learning corpus, and discuss the plausibility of this
architecture as a cognitive model of language learning and memory.
Abstract: Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.