Abstract: With the widespread growth of applications of
Wireless Sensor Networks (WSNs), the need for reliable security
mechanisms these networks has increased manifold. Many security
solutions have been proposed in the domain of WSN so far. These
solutions are usually based on well-known cryptographic
algorithms.
In this paper, we have made an effort to survey well known
security issues in WSNs and study the behavior of WSN nodes that
perform public key cryptographic operations. We evaluate time
and power consumption of public key cryptography algorithm for
signature and key management by simulation.
Abstract: Computer worm detection is commonly performed by
antivirus software tools that rely on prior explicit knowledge of the
worm-s code (detection based on code signatures). We present an
approach for detection of the presence of computer worms based on
Artificial Neural Networks (ANN) using the computer's behavioral
measures. Identification of significant features, which describe the
activity of a worm within a host, is commonly acquired from security
experts. We suggest acquiring these features by applying feature
selection methods. We compare three different feature selection
techniques for the dimensionality reduction and identification of the
most prominent features to capture efficiently the computer behavior
in the context of worm activity. Additionally, we explore three
different temporal representation techniques for the most prominent
features. In order to evaluate the different techniques, several
computers were infected with five different worms and 323 different
features of the infected computers were measured. We evaluated
each technique by preprocessing the dataset according to each one
and training the ANN model with the preprocessed data. We then
evaluated the ability of the model to detect the presence of a new
computer worm, in particular, during heavy user activity on the
infected computers.
Abstract: In recent years with the rapid development of Internet and the Web, more and more web applications have been deployed in many fields and organizations such as finance, military, and government. Together with that, hackers have found more subtle ways to attack web applications. According to international statistics, SQL Injection is one of the most popular vulnerabilities of web applications. The consequences of this type of attacks are quite dangerous, such as sensitive information could be stolen or authentication systems might be by-passed. To mitigate the situation, several techniques have been adopted. In this research, a security solution is proposed using Artificial Neural Network to protect web applications against this type of attacks. The solution has been experimented on sample datasets and has given promising result. The solution has also been developed in a prototypic web application firewall called ANNbWAF.
Abstract: Data mining incorporates a group of statistical
methods used to analyze a set of information, or a data set. It operates
with models and algorithms, which are powerful tools with the great
potential. They can help people to understand the patterns in certain
chunk of information so it is obvious that the data mining tools have
a wide area of applications. For example in the theoretical chemistry
data mining tools can be used to predict moleculeproperties or
improve computer-assisted drug design. Classification analysis is one
of the major data mining methodologies. The aim of thecontribution
is to create a classification model, which would be able to deal with a
huge data set with high accuracy. For this purpose logistic regression,
Bayesian logistic regression and random forest models were built
using R software. TheBayesian logistic regression in Latent GOLD
software was created as well. These classification methods belong to
supervised learning methods.
It was necessary to reduce data matrix dimension before construct
models and thus the factor analysis (FA) was used. Those models
were applied to predict the biological activity of molecules, potential
new drug candidates.
Abstract: Human-related information security breaches within organizations are primarily caused by employees who have not been made aware of the importance of protecting the information they work with. Information security awareness is accordingly attracting more attention from industry, because stakeholders are held accountable for the information with which they work. The authors developed an Information Security Retrieval and Awareness model – entitled “ISRA" – that is tailored specifically towards enhancing information security awareness in industry amongst all users of information, to address shortcomings in existing information security awareness models. This paper is principally aimed at expounding a prototype for the ISRA model to highlight the advantages of utilizing the model. The prototype will focus on the non-technical, humanrelated information security issues in industry. The prototype will ensure that all stakeholders in an organization are part of an information security awareness process, and that these stakeholders are able to retrieve specific information related to information security issues relevant to their job category, preventing them from being overburdened with redundant information.
Abstract: Accurate loss minimization is the critical component
for efficient electrical distribution power flow .The contribution of
this work presents loss minimization in power distribution system
through feeder restructuring, incorporating DG and placement of
capacitor. The study of this work was conducted on IEEE
distribution network and India Electricity Board benchmark
distribution system. The executed experimental result of Indian
system is recommended to board and implement practically for
regulated stable output.
Abstract: There is an urgent need to develop novel
Mycobacterium tuberculosis (Mtb) drugs that are active against drug
resistant bacteria but, more importantly, kill persistent bacteria. Our
study structured based on integrated analysis of metabolic pathways,
small molecule screening and similarity Search in PubChem
Database. Metabolic analysis approaches based on Unified weighted
used for potent target selection. Our results suggest that pantothenate
synthetase (panC) and and 3-methyl-2-oxobutanoate hydroxymethyl
transferase (panB) as a appropriate drug targets. In our study, we
used pantothenate synthetase because of existence inhibitors. We
have reported the discovery of new antitubercular compounds
through ligand based approaches using computational tools.
Abstract: Due to the deregulation of the Electric Supply
Industry and the resulting emergence of electricity market, the
volumes of power purchases are on the rise all over the world. In a
bid to meet the customer-s demand in a reliable and yet economic
manner, utilities purchase power from the energy market over and
above its own production. This paper aims at developing an optimal
power purchase model with two objectives viz economy and
environment ,taking various functional operating constraints such as
branch flow limits, load bus voltage magnitudes limits, unit capacity
constraints and security constraints into consideration.The price of
purchased power being an uncertain variable is modeled using fuzzy
logic. DEMO (Differential Evolution For Multi-objective
Optimization) is used to obtain the pareto-optimal solution set of the
multi-objective problem formulated. Fuzzy set theory has been
employed to extract the best compromise non-dominated solution.
The results obtained on IEEE 30 bus system are presented and
compared with that of NSGAII.
Abstract: A virtual collaborative classroom was created at East Carolina University, using videoconference technology via regular internet to bring students from 18 different countries, 2 at a time, to the ECU classroom in real time to learn about each other-s culture. Students from two countries are partnered one on one, they meet for 4-5 weeks, and submit a joint paper. Then the same process is repeated for two other countries. Lectures and student discussions are managed with pre-determined topics and questions. Classes are conducted in English and reading assignments are placed on the website. Administratively all partners are independent, students pay fees and get credits at their home institution. Familiarity with technology, knowledge in cultural understanding and attitude change were assessed, only attitude changes are reported in this paper. After taking this course, all students stated their comfort level in working with, and their desire to interact with, culturally different others grew stronger and their xenophobia and isolationist attitudes decreased.
Abstract: Societal security, continuity scenarios and methodological cycling approach explained in this article. Namely societal security organizational challenges ask implementation of international standards BS 25999-2 & global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity & interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization system, resulting to a crisis scene or even to a battle theatre. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management & overmastering in real environments.
Abstract: In Supply Chain Management (SCM), strengthening partnerships with suppliers is a significant factor for enhancing competitiveness. Hence, firms increasingly emphasize supplier evaluation processes. Supplier evaluation systems are basically developed in terms of criteria such as quality, cost, delivery, and flexibility. Because there are many variables to be analyzed, this process becomes hard to execute and needs expertise. On this account, this study aims to develop an expert system on supplier evaluation process by designing Artificial Neural Network (ANN) that is supported with Data Envelopment Analysis (DEA). The methods are applied on the data of 24 suppliers, which have longterm relationships with a medium sized company from German Iron and Steel Industry. The data of suppliers consists of variables such as material quality (MQ), discount of amount (DOA), discount of cash (DOC), payment term (PT), delivery time (DT) and annual revenue (AR). Meanwhile, the efficiency that is generated by using DEA is added to the supplier evaluation system in order to use them as system outputs.
Abstract: Air quality studies were carried out in the towns of
Putrajaya, Petaling Jaya and Nilai in the Malaysian Peninsular. In this
study, the variations of Ozone (O3) concentrations over a four year
period (2008-2011) were investigated using data obtained from the
Malaysian Department of the Environment (DOE). This study aims to
identify and describe the daily and monthly variations of O3
concentrations at the monitoring sites mentioned. The SPPS program
(Statistical Package for the Social Science) was used to analyze this
data in order to obtain the variations of O3 and also to clarify the
relationship between the stations. The findings of the study revealed
that the highest concentration of O3 occurred during the midday and
afternoon (between 13:00-15:00 hrs). The comparison between
stations also showed that highest O3 concentrations were recorded in
Putrajaya. The comparisons of average and maximum concentrations
of O3 for the three stations showed that the strongest significant
correlation was recorded in the Petaling Jaya station with the value
R2= 0.667. Results from this study indicate that in the urban areas of
Peninsular Malaysia, the concentration of O3 depends on the
concentration of NOx. Furthermore, HYSPLIT back trajectories
(-72h) indicated that air-mass transport patterns can also influence the
O3 concentration in the areas studied.
Abstract: Tungsten trioxide has been prepared by using P-PTA
as a precursor on alumina substrates by spin coating method.
Palladium introduced on WO3 film via electrolysis deposition by
using palladium chloride as catalytic precursor. The catalytic
precursor was introduced on the series of films with different
morphologies. X-ray diffractometry (XRD), Scanning electron
microscopy (SEM) and XPS were applied to analyze structure and
morphology of the fabricated thin films. Then we measured variation
of samples- electrical conductivity of pure and Pd added films in air
and diluted hydrogen. Addition of Pd resulted in a remarkable
improvement of the hydrogen sensing properties of WO3 by detection
of Hydrogen below 1% at room temperature. Also variation of the
electrical conductivity in the presence of diluted hydrogen revealed
that response of samples depends rather strongly on the palladium
configuration on the surface.
Abstract: As global industry developed rapidly, the energy
demand also rises simultaneously. In the production process, there’s a
lot of energy consumed in the process. Formally, the energy used in
generating the heat in the production process. In the total energy
consumption, 40% of the heat was used in process heat, mechanical
work, chemical energy and electricity. The remaining 50% were
released into the environment. It will cause energy waste and
environment pollution. There are many ways for recovering the waste
heat in factory. Organic Rankine Cycle (ORC) system can produce
electricity and reduce energy costs by recovering the waste of low
temperature heat in the factory. In addition, ORC is the technology
with the highest power generating efficiency in low-temperature heat
recycling. However, most of factories executives are still hesitated
because of the high implementation cost of the ORC system, even a lot
of heat are wasted. Therefore, this study constructs a nonlinear
mathematical model of waste heat recovery equipment configuration
to maximize profits. A particle swarm optimization algorithm is
developed to generate the optimal facility installation plan for the ORC
system.
Abstract: Cryptographic protocols are widely used in various
applications to provide secure communications. They are usually
represented as communicating agents that send and receive messages.
These agents use their knowledge to exchange information and
communicate with other agents involved in the protocol. An agent
knowledge can be partitioned into explicit knowledge and procedural
knowledge. The explicit knowledge refers to the set of information
which is either proper to the agent or directly obtained from other
agents through communication. The procedural knowledge relates to
the set of mechanisms used to get new information from what is
already available to the agent.
In this paper, we propose a mathematical framework which specifies
the explicit knowledge of an agent involved in a cryptographic
protocol. Modelling this knowledge is crucial for the specification,
analysis, and implementation of cryptographic protocols. We also,
report on a prototype tool that allows the representation and the
manipulation of the explicit knowledge.
Abstract: Testing accounts for the major percentage of technical
contribution in the software development process. Typically, it
consumes more than 50 percent of the total cost of developing a
piece of software. The selection of software tests is a very important
activity within this process to ensure the software reliability
requirements are met. Generally tests are run to achieve maximum
coverage of the software code and very little attention is given to the
achieved reliability of the software. Using an existing methodology,
this paper describes how to use Bayesian Belief Networks (BBNs) to
select unit tests based on their contribution to the reliability of the
module under consideration. In particular the work examines how the
approach can enhance test-first development by assessing the quality
of test suites resulting from this development methodology and
providing insight into additional tests that can significantly reduce
the achieved reliability. In this way the method can produce an
optimal selection of inputs and the order in which the tests are
executed to maximize the software reliability. To illustrate this
approach, a belief network is constructed for a modern software
system incorporating the expert opinion, expressed through
probabilities of the relative quality of the elements of the software,
and the potential effectiveness of the software tests. The steps
involved in constructing the Bayesian Network are explained as is a
method to allow for the test suite resulting from test-driven
development.
Abstract: Contamination of aromatic compounds in water can
cause severe long-lasting effects not only for biotic organism but also
on human health. Several alternative technologies for remediation of
polluted water have been attempted. One of these is adsorption
process of aromatic compounds by using organic modified clay
mineral. Porous structure of clay is potential properties for molecular
adsorptivity and it can be increased by immobilizing hydrophobic
structure to attract organic compounds. In this work natural
montmorillonite were modified with cetyltrimethylammonium
(CTMA+) and was evaluated for use as adsorbents of aromatic
compounds: benzene, toluene, and 2-chloro phenol in its single and
multicomponent solution by ethanol:water solvent. Preparation of
CTMA-montmorillonite was conducted by simple ion exchange
procedure and characterization was conducted by using x-day
diffraction (XRD), Fourier-transform infra red (FTIR) and gas
sorption analysis. The influence of structural modification of
montmorillonite on its adsorption capacity and adsorption affinity of
organic compound were studied. It was shown that adsorptivity of
montmorillonite was increased by modification associated with
arrangements of CTMA+ in the structure even the specific surface
area of modified montmorillonite was lower than raw
montmorillonite. Adsorption rate indicated that material has affinity
to adsorb compound by following order: benzene> toluene > 2-chloro
phenol. The adsorption isotherms of benzene and toluene showed 1st
order adsorption kinetic indicating a partition phenomenon of
compounds between the aqueous and organophilic CTMAmontmorillonite.
Abstract: Many well-known interconnection networks, such as kary n-cubes, recursive circulant graphs, generalized recursive circulant graphs, circulant graphs and so on, are shown to belong to the family of cycle composition networks. Recently, various studies about mutually independent hamiltonian cycles, abbreviated as MIHC-s, on interconnection networks are published. In this paper, using an improved construction method, we obtain MIHC-s on cycle composition networks with a much weaker condition than the known result. In fact, we established the existence of MIHC-s in the cycle composition networks and the result is optimal in the sense that the number of MIHC-s we constructed is maximal.
Abstract: Lipases are enzymes particularly amenable for
immobilization by entrapment methods, as they can work equally
well in aqueous or non-conventional media and long-time stability of
enzyme activity and enantioselectivity is needed to elaborate more
efficient bioprocesses. The improvement of Pseudomonas
fluorescens (Amano AK) lipase characteristics was investigated by
optimizing the immobilization procedure in hybrid organic-inorganic
matrices using ionic liquids as additives. Ionic liquids containing a
more hydrophobic alkyl group in the cationic moiety are beneficial
for the activity of immobilized lipase. Silanes with alkyl- or aryl
nonhydrolizable groups used as precursors in combination with
tetramethoxysilane could generate composites with higher
enantioselectivity compared to the native enzyme in acylation
reactions of secondary alcohols. The optimal effect on both activity
and enantioselectivity was achieved for the composite made from
octyltrimethoxysilane and tetramethoxysilane at 1:1 molar ratio (60%
increase of total activity following immobilization and enantiomeric
ratio of 30). Ionic liquids also demonstrated valuable properties as
reaction media for the studied reactions, comparable with the usual
organic solvent, hexane.
Abstract: Images of human iris contain specular highlights due
to the reflective properties of the cornea. This corneal reflection
causes many errors not only in iris and pupil center estimation but
also to locate iris and pupil boundaries especially for methods that
use active contour. Each iris recognition system has four steps:
Segmentation, Normalization, Encoding and Matching. In order to
address the corneal reflection, a novel reflection removal method is
proposed in this paper. Comparative experiments of two existing
methods for reflection removal method are evaluated on CASIA iris
image databases V3. The experimental results reveal that the
proposed algorithm provides higher performance in reflection
removal.